scholarly journals New concept for cryptographic construction design based on noniterative behavior

Author(s):  
Abdallah Abouchouar ◽  
Fouzia Omary ◽  
Khadija Achkoun

<span>Nowadays, cryptography especially hash functions require to move from classical paradigms to an original concept able to handle security issues and new hardware architecture challenges as in distributed systems. In fact, most of current hash functions apply the same design pattern that was proved vulnerable against security threats; hence the impact of a potential weakness can be costly. Thus, the solution begins with a deep analysis of divers attack strategies; this way can lead to finding a new approach that enables new innovative and reliable candidates as alternative hash functions. So to achieve this goal, in this article we introduce a new construction design that consists of a non-iterative behavior by combining a parallel block processing and a sequential xor addition process, in order to provide a secure design without changing the expected goal of a hash function, at the same time avoid the use of vulnerable structures.</span>

Author(s):  
Jean-Frédéric Morin ◽  
Amandine Orsini ◽  
Sikina Jinnah

This chapter discusses the relationship between the environment and security. The concept of ‘environmental security’ is omnipresent, but is nonetheless ambiguous and contested. What exactly needs to be secured, and what are the security threats? Is environmental security about state security, faced with the loss of natural resources? Or is it about protecting individuals and communities from environmental degradation and reduced access to key environmental resources? A first step in clarifying these questions is to disentangle two related but distinct causal arguments. In the relationship between environment and security, environmental degradation can be analysed either as a cause or as a consequence of security issues. A second step needed to clarify these debates is to adopt clear definitions. In the context of international relations, security has traditionally been understood in relation to the survival of the state, and the main threats to state security are armed conflicts. For the purpose of this chapter, conflicts are defined as any type of disagreement. The chapter also examines the impact of conflicts on the environment.


2018 ◽  
Vol 52 (7) ◽  
pp. 456-459 ◽  
Author(s):  
Pascal Borry ◽  
Timothy Caulfield ◽  
Xavier Estivill ◽  
Sigmund Loland ◽  
Michael McNamee ◽  
...  

Through the widespread availability of location-identifying devices, geolocalisation could potentially be used to place athletes during out-of-competition testing. In light of this debate, the WADA Ethics Panel formulated the following questions: (1) should WADA and/or other sponsors consider funding such geolocalisation research projects?, (2) if successful, could they be proposed to athletes as a complementary device to Anti-Doping Administration and Management System to help geolocalisation and reduce the risk of missed tests? and (3) should such devices be offered on a voluntary basis, or is it conceivable that they would be made mandatory for all athletes in registered testing pools? In this position paper, the WADA Ethics Panel concludes that the use of geolocalisation could be useful in a research setting with the goal of understanding associations between genotype, phenotype and environment; however, it recognises that the use of geolocalisation as part of or as replacement of whereabouts rules is replete with ethical concerns. While benefits remain largely hypothetical and minimal, the potential invasion of privacy and the data security threats are real. Considering the impact on privacy, data security issues, the societal ramifications of offering such services and various pragmatic considerations, the WADA Ethics Panel concludes that at this time, the use of geolocalisation should neither be mandated as a tool for disclosing whereabouts nor implemented on a voluntary basis.


2021 ◽  
Vol 4 (3) ◽  
pp. 11-21
Author(s):  
Nasiba Ismailova ◽  

This article is devoted to the description of the socio-economic essence of financial security, indicators of financial security, different opinions on the concept of monetary security, issues of ensuring the financial security of the Republic of Uzbekistan.The aim of the study is to investigate indicators of state financial security and identify threats to financial security at the macro level in Uzbekistan, determine the intensity, content, sources, and causes of the impact of threatening factors, create a unified approach to limiting threats and develop recommendations for its practical application.The scientific novelty of the research:1. It was proposed to abolish the practice of issuing loans at preferential interest rates, giving commercial banks the right to independently set interest rates by introducing mechanisms to compensate for a certain part of interest costs, to improve the diversification of international gold and foreign exchange reserves of Uzbekistan;2. Developed the parameters of the zones that determine the state of each security indicator by studying the indicator of the level of financial security by comparing the current (real) situation with a certain class (nominal) in terms of security;3. The system of indicators and the approach based on threshold values in the study of financial security problems have been analyzed. Developed and grouped program measures to limit and neutralize security threats


Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


2006 ◽  
Vol 10 (2) ◽  
pp. 287-301
Author(s):  
Anush Begoyan

AbstractThe article examines security issues of the Transcaucasian region with the focus on nonmilitary and trans-border security threats and a regional security community that also includes non-state security actors of the region, such as not-recognised autonomous entities, nations, ethnic groups, minorities, etc.This approach to regional security shifts the focus of policies from balance of power to closer regional integration and cooperation, as well as joint provision of regional security. Despite many objectives and existing obstacles to this scenario of regional development, the author sees it to be the only way toward a stable and long-term security in the region. The article argues that closer regional cooperation and integration would allow to accommodate interests and security concerns of non-state actors of the region and would bring the fate of regional issues back in the hands of the regional powers and create bases for sustainable and lasting peace in the region.


2021 ◽  
Vol 26 (4) ◽  
pp. 1-31
Author(s):  
Pruthvy Yellu ◽  
Landon Buell ◽  
Miguel Mark ◽  
Michel A. Kinsy ◽  
Dongpeng Xu ◽  
...  

Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.


2021 ◽  
Vol 11 (4) ◽  
pp. 1855
Author(s):  
Franco Guzzetti ◽  
Karen Lara Ngozi Anyabolu ◽  
Francesca Biolo ◽  
Lara D’Ambrosio

In the construction field, the Building Information Modeling (BIM) methodology is becoming increasingly predominant and the standardization of its use is now an essential operation. This method has become widespread in recent years, thanks to the advantages provided in the framework of project management and interoperability. Hoping for its complete dissemination, it is unthinkable to use it only for new construction interventions. Many are experiencing what happens with the so-called Heritage Building Information Modeling (HBIM); that is, how BIM interfaces with Architectural Heritage or simply with historical buildings. This article aims to deal with the principles and working methodologies behind BIM/HBIM and modeling. The aim is to outline the themes on which to base a new approach to the instrument. In this way, it can be adapted to the needs and characteristics of each type of building. Going into the detail of standards, the text also contains a first study regarding the classification of moldable elements. This proposal is based on current regulations and it can provide flexible, expandable, and unambiguous language. Therefore, the content of the article focuses on a revision of the thinking underlying the process, also providing a more practical track on communication and interoperability.


2021 ◽  
pp. 000276422110216
Author(s):  
Kazimierz M. Slomczynski ◽  
Irina Tomescu-Dubrow ◽  
Ilona Wysmulek

This article proposes a new approach to analyze protest participation measured in surveys of uneven quality. Because single international survey projects cover only a fraction of the world’s nations in specific periods, researchers increasingly turn to ex-post harmonization of different survey data sets not a priori designed as comparable. However, very few scholars systematically examine the impact of the survey data quality on substantive results. We argue that the variation in source data, especially deviations from standards of survey documentation, data processing, and computer files—proposed by methodologists of Total Survey Error, Survey Quality Monitoring, and Fitness for Intended Use—is important for analyzing protest behavior. In particular, we apply the Survey Data Recycling framework to investigate the extent to which indicators of attending demonstrations and signing petitions in 1,184 national survey projects are associated with measures of data quality, controlling for variability in the questionnaire items. We demonstrate that the null hypothesis of no impact of measures of survey quality on indicators of protest participation must be rejected. Measures of survey documentation, data processing, and computer records, taken together, explain over 5% of the intersurvey variance in the proportions of the populations attending demonstrations or signing petitions.


2021 ◽  
pp. 112067212110307
Author(s):  
Julia Sieberer ◽  
Patrick Hughes ◽  
Indy Sian

Objectives: The coronavirus pandemic has forced healthcare staff across all medical specialties to adapt new and different ways of working. A new approach has been set up in the Acute Referral Clinic (ARC) at Musgrove Park Hospital and a survey has been conducted to measure the impact of the new method on patient and healthcare professionals’ satisfaction with the new service. Methods: A telephone-based consultation was introduced in ARC at Musgrove Park Hospital in March 2020 and patients were instructed to fill out a questionnaire containing eight items using a Likert Scale 1 (‘very poor/disagree’) to 4 (‘very good/strongly agree’) plus two boxes for open positive and negative comments respectively. Likewise a questionnaire was designed in order to assess the healthcare professionals’ satisfaction using the new approach. Data collection took place over a two month period between the end of March 2020 and end of May 2020. The data underwent quality control and was analysed using descriptive statistics. Results: Patient responses illustrated high satisfaction scores with an overall rating of very good (89.4%). The healthcare professionals’ rating of the service was good (28.6% – ‘very good/strongly agree’, 57.1% – ‘good/agree’). The safety rating of the new approach was overall rated ‘very good’ with 90.4% and 71.4% of patients and healthcare professionals respectively. Conclusions: The telephone consultations introduced in the wake of COVID-19 are well accepted by both patients and doctors. There are some limitations of the approach, foremost being consultation time and clinic space but these do not outweigh the general benefit of this format amidst a pandemic setting.


Author(s):  
Yernar Zh Akimbayev ◽  
Zhumabek Kh Akhmetov ◽  
Murat S Kuanyshbaev ◽  
Arman T Abdykalykov ◽  
Rashid V Ibrayev

Studying the historical facts of past wars and armed conflicts and natural and man-made emergencies, today in the Republic of Kazakhstan one of the most important security issues is the preparation and organization of the evacuation of the population from possible dangerous zones, taking into account the emergence of new threats to the country’s security. The paper presents an algorithm for constructing universal scales of the distribution function of opportunities by types of support and rebuilding them into subject scales using display functions. The purpose of the paper is to determine the integral indicators characterizing the possibility of accommodation of the evacuated population and the impact on resources during relocation. On the subject scales of cities and districts of the region, indicators of the possibility of relocation of a certain amount of the evacuated population by types of support and indicators characterizing the impact on the district’s resources during resettlement of a certain amount of the evacuated population are determined. It was concluded that the use of integrated indicators allows the selection of areas to accommodate the evacuated population without the use of statistical data, in conditions of incomplete and inaccurate information. The presented method does not replace traditional methods based on classical methods of territory assessment by the level of life sustenance, but also allows their reasonable combination with the experience of specialists in this field, taking into account the incompleteness, uncertainty, and inconsistency of the initial data of the study area, which does not allow the application of existing methods.


Sign in / Sign up

Export Citation Format

Share Document