+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Authors

Burmistrov V.

Degree
Postgraduate, FSAEI HPE North-Caucasus Federal University
E-mail
rossthebossstav@mail.ru
Location
Stavropol
Articles

Assessment the security of wireless alarm from unauthorized access based on the concepts of fuzzy logic

Nowadays, the world has witnessed a significant increase in the number of stolen vehicles. One of the main reasons for the high number of thefts is the use of wireless alarm systems. One of the vulnerabilities of wireless signaling is between the mobile radio remotes control and alarm stationary control unit that carries control commands that may be intercepted, viewed or tampered with. Currently, there are many ways of ensuring information security of the radio channel. However, there are no methods for assessing signaling radio bearer security from unauthorized access. The purpose of this paper is to provide a method of quantitative and qualitative evaluation of security radio signals from unauthorized access. The analysis showed that at present there are no perfect valuation techniques protected from unauthorized access. In addition to the drawbacks of each method individually, many of them have a common negative feature is the fact, not security assessment is comprehensive and focused on one or more threats to information security. The authors proposed a method of quantitative and qualitative evaluation of security against unauthorized wireless access, including automotive, signaling, based on the concepts of fuzzy logic. To substantiate the results obtained evaluated radio alarm security against unauthorized access three different wireless car alarms that have different methods of protection against threats such as browsing, interception and substitution. The proposed method of quantitative and qualitative evaluation of security radio signal from unauthorized access different: a comprehensive assessment of security wireless alarm radio from unauthorized access, simple math, simple software implementation and adequate representation of the probability of different types of wireless alarm counter threats to information security in the radio channel.
Read more...

Assessing the crypto resistance to the destructive effect of "viewing transmitted data" in the case of quantum computers

In this paper, we evaluate the crypto resistance of known cryptographic methods and methods based on the use of noise-like signals, similar in properties to "limited" white noise and used to spread spectrum of transmitted messages, to the destructive effect of "viewing transmitted data" (decipher), based on the search of code structures (brute force), in the case of quantum computers. It’s established that the required value of the number of code structures (key space), taking into account the constantly improving and developing computing power of quantum computers, for the next few years should be considered a value of 1032 of the number of code structures (key space) and higher, providing crypto resistance for a minimum of 3 years. It’s shown that the Grover algorithm is similar to the destructive effect of "viewing transmitted data" (decipher), based on a complete search of all code structures (brute force) using modern super- computers. It’s established that well-known symmetric cryptographic methods can potentially be used in the post-quantum era and methods based on noise-like signals potentially, provided they are detected and aware of the methods underlying them (without knowledge of the key), cannot be applied in the post-quantum era. According to the authors, a promising approach in the post-quantum era for information security issues is the use of chaotic signals. Read more...