scholarly journals Experimental use of selected steganographic and crypto-graphic algorithms - laboratory workstation

2019 ◽  
Vol 24 (6) ◽  
pp. 168-173
Author(s):  
Małgorzata Górska ◽  
Jarosław Molendowski

The main task discussed in this publication was to prepare a laboratory stand to investigate the confidentiality of information processed. The first part of the article presents a comparison of the possibilities of two open license programs - encryption tools that implement encryption with the use of AES block cipher. The second part describes the operation of two programs created in C++ for the needs of the laboratory workstation. The first one performs classic, changeable encryption, the second one uses XOR operation for encryption.

Author(s):  
Sambhu Prasad Panda ◽  
Madhusmita Sahu ◽  
Manas Kumar Swain

Cellular Automaton is an idealized parallel processing machine which is an array (1-D, 2-D) of numbers or symbols called cell values together with an updating rule. A cell value is updated based on this updating rule, which involves the cell value as well as other cell values in a particular neighborhood. A fundamental objective of cryptography is to enable two people to communicate over an insecure channel (a public channel such as internet) in such a way that any other person is unable to recover their message (called the plaintext) from what is sent in its place over the channel (the cipher text). The transformation of the plaintext into the cipher text is called encryption, or enciphering. The transformation of the cipher text into the plaintext is called decryption, or deciphering. In this paper we present a new encryption and decryption algorithm based on the linear (periodic boundary-PB) and nonlinear Cellular Automata rules. First we apply PB CA rules to plain text and key. The result of both plain text and key is XORed. Then the result of XOR operation is fed to substitution box( S-box) and again PB CA rules are applied for exchange and shift operations. At the end Complement operation is applied for encryption of plain text. The decryption process is carried out just similar to encryption but in the reverse way. Both the process of encryption and decryption is performed for 8 numbers of rounds in order to avoid the dependency between the plain text and cipher text.


Author(s):  
Sambhu Prasad Panda ◽  
Madhusmita Sahu ◽  
Umesh Prasad Rout ◽  
Surendra Kumar Nanda

In this paper we present a new encryption and decryption algorithm for block cipher based on the linear (periodic boundary-PB) and nonlinear cellular automata rules. First we apply non linear CA rules (complements) to both plain text and key. Then PB CA rule is applied to the above results separately followed by the XOR operation of above results. After that the result of XOR operation is fed to substitution box(S-box) and again PB CA rules are applied followed by SBox. The decryption process is carried out just similar to that of encryption but in the reverse way. Both the process of encryption and decryption is performed for 8 number of rounds in order to avoid the dependency between the plain text and cipher text so that the our proposed algorithm is more secure than that of AES and DES algorithms.


Symmetry ◽  
2019 ◽  
Vol 11 (12) ◽  
pp. 1485
Author(s):  
Yasir Nawaz ◽  
Lei Wang

Designing a secure construction has always been a fascinating area for the researchers in the field of symmetric key cryptography. This research aimed to make contributions to the design of secure block cipher in the ideal cipher model whose underlying primitive is a family of n − b i t to n − b i t random permutations indexed by secret key. Our target construction of a secure block ciphers denoted as E [ s ] is built on a simple XOR operation and two block cipher invocations, under the assumptions that the block cipher in use is a pseudorandom permutation. One out of these two block cipher invocations produce a subkey that is derived from the secret key. It has been accepted that at least two block cipher invocations with XOR operations are required to achieve beyond birthday bound security. In this paper, we investigated the E [ s ] instances with the advanced proof technique and efficient block cipher constructions that bypass the birthday-bound up to 2 n provable security was achieved. Our study provided new insights to the block cipher that is beyond birthday bound security.


Author(s):  
Xing-Yuan Wang ◽  
Zhi-Ming Li

AbstractIn this paper, a new chaotic image encryption scheme is proposed, which uses the combination of stream cipher and block cipher to spread and then uses the Logistic mapping matrix to perform the block sort transformation to complete the confusion. The specific method is as follows: First, perform the triple XOR operation, non-linear S-box transformation and linear cyclic shift transformation on the key. Second, the triple XOR operation of the transformed key and the plaintext and Logistic mapping sequence are used to obtain the semi-ciphertext. And set the obtained semi-ciphertext and plaintext as key components of the next round of encryption. Finally, the transformation of sorting and partition of the Logistic mapping matrix are used to confuse the semi-ciphertext. The experimental results show that the proposed algorithm improves the encryption efficiency, has good security and can resist common attacks.


2008 ◽  
pp. 110-134
Author(s):  
Pavlo Yuriyovych Pavlenko

The cornerstone of any religion is its anthropological concept, which seeks to determine the essential orientations of man, to outline the ideological framework of its existence, to represent the idea of ​​its essence, purpose in earthly life. The main task of the religious system is the act of involving and subordinating man to the spiritual divine realm as the realm of the transcendental existence of God. Belief in the real presence of the latter implies a new understanding of oneself, which ultimately leads the religious individual to the desire to be involved in this transcendental existence, to have intimate relations with him, to have a consciousness inherent in God. Note that in this context, all human being is interpreted as a certain arena for this realization. Therefore, the religious life of the individual acquires the status of religious activity.


Author(s):  
M. G. Koliada ◽  
T. I. Bugayova

The article discusses the history of the development of the problem of using artificial intelligence systems in education and pedagogic. Two directions of its development are shown: “Computational Pedagogic” and “Educational Data Mining”, in which poorly studied aspects of the internal mechanisms of functioning of artificial intelligence systems in this field of activity are revealed. The main task is a problem of interface of a kernel of the system with blocks of pedagogical and thematic databases, as well as with the blocks of pedagogical diagnostics of a student and a teacher. The role of the pedagogical diagnosis as evident reflection of the complex influence of factors and reasons is shown. It provides the intelligent system with operative and reliable information on how various reasons intertwine in the interaction, which of them are dangerous at present, where recession of characteristics of efficiency is planned. All components of the teaching and educational system are subject to diagnosis; without it, it is impossible to own any pedagogical situation optimum. The means in obtaining information about students, as well as the “mechanisms” of work of intelligent systems based on innovative ideas of advanced pedagogical experience in diagnostics of the professionalism of a teacher, are considered. Ways of realization of skill of the teacher on the basis of the ideas developed by the American scientists are shown. Among them, the approaches of researchers D. Rajonz and U. Bronfenbrenner who put at the forefront the teacher’s attitude towards students, their views, intellectual and emotional characteristics are allocated. An assessment of the teacher’s work according to N. Flanders’s system, in the form of the so-called “The Interaction Analysis”, through the mechanism of fixing such elements as: the verbal behavior of the teacher, events at the lesson and their sequence is also proposed. A system for assessing the professionalism of a teacher according to B. O. Smith and M. O. Meux is examined — through the study of the logic of teaching, using logical operations at the lesson. Samples of forms of external communication of the intellectual system with the learning environment are given. It is indicated that the conclusion of the found productive solutions can have the most acceptable and comfortable form both for students and for the teacher in the form of three approaches. The first shows that artificial intelligence in this area can be represented in the form of robotized being in the shape of a person; the second indicates that it is enough to confine oneself only to specially organized input-output systems for targeted transmission of effective methodological recommendations and instructions to both students and teachers; the third demonstrates that life will force one to come up with completely new hybrid forms of interaction between both sides in the form of interactive educational environments, to some extent resembling the educational spaces of virtual reality.


2004 ◽  
pp. 114-128
Author(s):  
V. Nimushin

In the framework of broad philosophic and historical context the author conducts comparative analysis of the conditions for assimilating liberal values in leading countries of the modern world and in Russia. He defends the idea of inevitable forward movement of Russia on the way of rationalization and cultivation of all aspects of life, but, to his opinion, it will occur not so fast as the "first wave" reformers thought and in other ideological and sociocultural forms than in Europe and America. The author sees the main task of the reformist forces in Russia in consolidation of the society and inplementation of socially responsible economic policy.


2019 ◽  
pp. 22-29
Author(s):  
Н. В. Фрадкіна

The purpose and tasks of the work are to analyze the contemporary Ukrainian mass culture in terms of its value and humanistic components, as well as the importance of cultural studies and Ukrainian studies in educational disciplines for the formation of a holistic worldview of modern youth.Analysis of research and publications. Scientists repeatedly turned to the problems of the role of spirituality in the formation of society and its culture. This problem is highlighted in the publications by O. Losev, V. Lytvyn, D. Likhachev, S. Avierintsev, M. Zakovych, I. Stepanenko and E. Kostyshyn.Experts see the main negative impact of mass culture on the quality approach, which determines mass culture through the market, because mass culture, from our point of view, is everything that is sold and used in mass demand.One of the most interesting studies on this issue was the work by the representatives of Frankfurt School M. Horkheimer and T. Adorno «Dialectics of Enlightenment» (1947), devoted to a detailed analysis of mass culture. Propaganda at all socio-cultural levels in the form is similar in both totalitarian and democratic countries. It is connected, according to the authors, with the direction of European enlightenment. The tendency to unify people is a manifestation of the influence of mass culture, from cinema to pop. Mass culture is a phenomenon whose existence is associated with commerce (accumulation in any form – this is the main feature of education), in general, the fact that it exists in this form is related to the direction of the history of civilization.Modern mass culture, with its externally attractive and easily assimilated ideas and symbols, appealing to the trends of modern fashion, becomes a standard of prestigious consumption, does not require intense reflection, allows you to relax, distract, not teach, but entertains, preaches hedonism as the main spiritual value. And as a consequence, there are socio-cultural risks: an active rejection of other people, which leads to the formation of indifference; cruelty as a character trait; increase of violent and mercenary crime; increase in the number of alcohol and drug addicts; anti-patriotism; indifference to the values of the family and as a result of social orphanhood and prostitution.Conclusions, perspectives of research. Thus, we can conclude that modern Ukrainian education is predominantly formed by the values of mass culture. Namely, according to the «Dialectic» by Horkheimer and Adorno, «semi-enlightenment becomes an objective spirit» of our modern society.It is concluded that only high-quality education can create the opposite of the onset of mass culture and the destruction of spirituality in our society. It is proved that only by realizing the importance of cultivating disciplines in the educational process and the spiritual upbringing of the nation, through educational reforms, humanitarian knowledge will gradually return to student audiences.Formation of youth occurs under the influence of social environment, culture, education and self-education. The optimal combination of these factors determines both the process of socialization itself and how successful it will be. In this context, one can see the leading role of education and upbringing. It turns out that the main task of modern education is to spread its influence on the development of spiritual culture of the individual, which eventually becomes a solid foundation for the formation of the individual. Such a subject requires both philosophical and humanitarian approaches in further integrated interdisciplinary research, since the availability of such research will provide the theoretical foundation for truly modern educational and personal development.


Sign in / Sign up

Export Citation Format

Share Document