scholarly journals Overview of cryptographic algorithms for audio files and their properties

Author(s):  
Tsvetelina Ivanova ◽  

Any cryptographic algorithm that is claimed to be effective must be properly analysed to prove its effectiveness, reliability and security. In this paper the most used quality indicators are reviewed and classified. The principles of the audio encryption are reviewed. A classification of the analysing methods is made.

2020 ◽  
Vol 13 (3) ◽  
pp. 435-445 ◽  
Author(s):  
Malik Qasaimeh ◽  
Raad S. Al-Qassas ◽  
Fida Mohammad ◽  
Shadi Aljawarneh

Background: Lightweight cryptographic algorithms have been the focus of many researchers in the past few years. This has been inspired by the potential developments of lightweight constrained devices and their applications. These algorithms are intended to overcome the limitations of traditional cryptographic algorithms in terms of exaction time, complex computation and energy requirements. Methods: This paper proposes LAES, a lightweight and simplified cryptographic algorithm for constricted environments. It operates on GF(24), with a block size of 64 bits and a key size of 80-bit. While this simplified AES algorithm is impressive in terms of processing time and randomness levels. The fundamental architecture of LAES is expounded using mathematical proofs to compare and contrast it with a variant lightweight algorithm, PRESENT, in terms of efficiency and randomness level. Results: Three metrics were used for evaluating LAES according to the NIST cryptographic applications statistical test suite. The testing indicated competitive processing time and randomness level of LAES compared to PRESENT. Conclusion: The study demonstrates that LAES achieves comparable results to PRESENT in terms of randomness levels and generally outperform PRESENT in terms of processing time.


2019 ◽  
Vol 1 (7) ◽  
pp. 53-59
Author(s):  
S. A. Nazarevich ◽  
V. G. Farafonov ◽  
A. V. Vinnichenko

The article describes the modernization of consumer characteristics, through the selection of the quality indicators nomenclature using cluster analysis, and bringing the complex technical system (CTS) model using the example of civil aviation technology (CAE) to an invariant form. Also, the article uses a methodological apparatus for assessing the degree of product innovation taking into account the total number of product technical characteristics presented by regulatory and design documentation for the products being created. The obtained characteristics were synthesized by translating consumer requirements of the main participants of the civil aviation equipment market segment. Taking into account the opinions of various consumer groups, five clusters were created and the basic structures of the model of a complex technical system were modeled. Applied technological device suitable for solving problems related to structured and classification of valuable technical characteristics with a planning horizon of 10 years various representatives of the company producing different brands of products related to complex technical systems of civil aviation equipment.


Author(s):  
Elena Rossinskaya ◽  
Igor Ryadovskiy

The authors analyze problems connected with malware from the standpoint of the doctrine of the methods of computer crimes/offenses as one of the components of the theory of information-computer support of criminalistic work. Most methods of computer crimes are based on the unauthorized access to computer facilities and systems gained through malware that, in fact, acts as a weapon of crime. The authors present a classification of malware based on different parameters: from the standpoint of criminal law and criminology; the standpoint of information technology; the standpoint of the doctrine of computer crimes/offenses. Various grounds for the classification of malware are examined. A general classification, widely used by the developers of antiviral software, includes virus-programs, worm-programs and trojan-programs. In the modern situation of massive digitization, it is not practical to regard masquerading as a legitimate file as a dominant feature of trojan software. On the contrary, criminals try hard to hide from the user the downloading, installation and activity of malware that cannot self-propagate. The key method of propagating trojan programs is sending mass emails with attachments masquerading as useful content. The classification of malware by the way and method of propagation - viruses, worms and trojan programs - is only currently used due to traditions and does not reflect the essence of the process. A different classification of malware into autonomous, semi-autonomous and non-autonomous programs is based on the possibility of their autonomous functioning. At present there is practically no malware whose functions include only one specific type of actions, most of it contains a combination of various types of actions implemented through module architecture, which offers criminals wide opportunities for manipulating information. The key mechanisms of malwares work are described and illustrated through examples. Special attention is paid to harmful encryption software working through stable cryptographic algorithms - ransomware, when criminals demand ransom for restoring data. There is no criminal liability for such theft. The authors outline the problems connected with the possibility of the appearance of new malware that would affect cloud resources.


Author(s):  
Alicja A. Wieczorkowska

The aim of musical instrument sound classification is to process information from audio files by a classificatory system and accurately identify musical instruments playing the processed sounds. This operation and its results are called automatic classification of musical instrument sounds.


1999 ◽  
Vol 8 (4) ◽  
pp. 396-406 ◽  
Author(s):  
LENA GUNNINGBERG ◽  
CHRISTINA LINDHOLM ◽  
MARIANNE CARLSSON ◽  
PER‐OLOW SJÖdÉn

2020 ◽  
Vol 75 (10) ◽  
pp. e138-e144
Author(s):  
Zoe Burns ◽  
Srijesa Khasnabish ◽  
Ann C Hurley ◽  
Mary Ellen Lindros ◽  
Diane L Carroll ◽  
...  

Abstract Background Many hospital systems in the United States report injurious inpatient falls using the National Database of Nursing Quality Indicators categories: None, Minor, Moderate, Major, and Death. The Major category is imprecise, including injuries ranging from a wrist fracture to potentially fatal subdural hematoma. The purpose of this project was to refine the Major injury classification to derive a valid and reliable categorization of the types and severities of Major inpatient fall-related injuries. Methods Based on published literature and ranking of injurious fall incident reports (n = 85) from a large Academic Medical Center, we divided the National Database of Nursing Quality Indicators Major category into three subcategories: Major A—injuries that caused temporary functional impairment (eg, wrist fracture), major facial injury without internal injury (eg, nasal bone fracture), or disruption of a surgical wound; Major B—injuries that caused long-term functional impairment or had the potential risk of increased mortality (eg, multiple rib fractures); and Major C—injuries that had a well-established risk of mortality (eg, hip fracture). Based on the literature and expert opinion, our research team reached consensus on an administration manual to promote accurate classification of Major injuries into one of the three subcategories. Results The team tested and validated each of the categories which resulted in excellent interrater reliability (kappa = .96). Of the Major injuries, the distribution of Major A, B, and C was 40.3%, 16.1%, and 43.6%, respectively. Conclusions These subcategories enhance the National Database of Nursing Quality Indicators categorization. Using the administration manual, trained personnel can classify injurious fall severity with excellent reliability.


Author(s):  
Fiorenzo Franceschini ◽  
Maurizio Galetto ◽  
Domenico Maisano
Keyword(s):  

Radiotekhnika ◽  
2021 ◽  
pp. 79-84
Author(s):  
D.V. Harmash

This work presents the analysis of the essence and possibilities of protection of the Rainbow post-quantum cryptographic algorithm. The main properties of the Rainbow algorithm and the general essence of cryptographic encryption and electronic signature algorithms based on multivariate quadratic transformations are determined. The main provisions regarding the protocols are given. Analyses are given regarding the ability to protect the algorithm against various attacks. The vulnerability of the algorithm to attack by third-party channels is investigated. The general provisions of the algorithm are considered. The algorithm is presented and considered from a mathematical point of view, as well as the mathematical essence of cryptographic algorithms for encryption and electronic signature based on multivariate quadratic transformations. The application of various methods of cryptanalysis against cryptographic algorithm based on multivariate quadratic Rainbow transformations is studied. The method of decreasing rank against the Rainbow algorithm is analyzed. The method of cryptanalysis by attacking the Oil-Vinegar scheme and the method of cryptanalysis "minranku method" are investigated. The attack is studied using a multilayer structure.


Sign in / Sign up

Export Citation Format

Share Document