Functional safety and survivability of information control elliptic-curve-based systems: models and methods
DOI:
https://doi.org/10.18372/2225-5036.19.4704Keywords:
information control system, elliptic curve, functional safety, survivability, system of Rademacher-Krestenson’s residual classesAbstract
There is an analysis of functional safety and survivability of information control systems relying on elliptic curve-based calculations. Time required for solving a discrete logarithm on GF(p) elliptic curves was worked out. Presented were aspects of the use of FPGA systems whose calculations were based on Rademacher-Krestenson’s remaining classes and parallel summing.References
J. Chen, Y. Wang, X. Wang. On-Demand Security Architecture for Cloud Computing // Computer. – 2012. – Vol. 45, No 7. – P. 73-78. – ISSN 0018-9162.
N.G. Leveson. Safeware: System Safety and Computers // Reading, Massachusetts: Addison-Wesley, 1995. – 680 p.
V.S. Kharchenko. Analysis of the problems of safeware engineering: the project TEMPUS-SAFEGUARD // Radioelectronic and Computer Systems. – 2010. – No (48). – P. 297-300. (in Ukrainian)
M. Karpinski. Information Security // Warsaw: Measurements, Automation and Monitoring. – 2012. – 280 p. – ISBN 978-83-930505-3-6. (in Polish)
R.L. Lagendijk, Z. Erkin, M. Barni. Encrypted Signal Processing for Privacy Protection // IEEE Signal Processing Magazine. – 2013. – Vol. 30, No 1. – P. 82-105.– ISSN 1053-5888.
R. Oppliger. Security and Privacy in an Online World // Computer. – 2011. – Vol. 44, No 9. – P. 21-22. – ISSN 0018-9162.
D. Hankerson, A. Menezes, S. Vanstone. Guide to elliptic curve cryptography // NY: Springer, 2004. – 332 p.
Bakhmach E.T., Herasimenko A.D., Golovir V.A. et al. Fail-safe information control systems on programmable logic / Kharchenko V.S., Sklyar V.V. (eds). – Kharkiv: National Aerospace University “KhAI”; Kirovohrad: RPC “Radiy”. – 2008. – 380 p. (in Russian)
V.O. Romankevych, M.S.Milad, S.O. Poleschuk . Functional safety evaluation for the reconfigurable fault-tolerant multiprocessor control systems // Applied Mathematics and Computing – AMC-2011: III Scientific Conference, April 13-15, 2011. – P. 157-161. (in Ukrainian)
I. Ahmed, S. Obermeier, M. Naedele, G.G. Richard. SCADA Systems: Challenges for Forensic Investigators // Computer. – 2012. – Vol. 45, No 12. – P. 73-78. – ISSN 0018-9162.
M.A. Yastrebenetsky, V.N. Vasilchenko, S.V. Vinogradska et al. Nuclear Power Plants Safety: Instrumentation and Control Systems / Yastrebenetsky M.A. (ed.). – Kiev: Technika. – 2004. ¬ 472 p. (in Russian) (Translated in English in 2007 by US Nuclear Regulatory Commission).
I. Blade I., G. Seroussi, N. Smart. Krzywe eliptyczne w kryptografii // Warszawa: TAO. – 2004. – 234 p.
I. Yakymenko, M. Kasyanchuk, Y. Nykolajchuk. Matrix algorithms of processing of the information flow in computer systems based on theoretical and numerical Krestenson’s basis // TCSET'2010, February 23-27, 2010, Lviv-Slavske, Ukraine. – P. 241.
P.C. Oorschot, M.J. Wiener. Parallel collision search with cryptanalytic applications // Journal of Cryptology. – 1999. – No 12. – P. 1-28.
А.Н. Маkоhа, B.U. Zuj. [Electronic resource] : The arithmetic of large integers in parallel computer systems // 20.03.2007. – http://revolution.allbest.ru /mathematics /00011260_0.html (in Russian)
O. Ugus, A. Hessler, D. Westhoff. [Electronic resource] : Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS, Technical Report, 6 // Fachgespräch "Drahtlose Sensornetze", July 2007. – http://www.ist-ubisecsens.org/publications/ EcElgamal- UgHesWest.pdf
T. Guneysu, Ch. Paar, L. Pelzl. [Electronic resource]: On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware // SHARCS'06, 2006. –
http://www.hyperelliptic.org/tanja/SHARCS/talks06/ecc_rub.pdf
T. Guneysu, G. Pfeiffer, C. Paar, M. Schimmler. Three years of evolution cryptanalysis with copacobana [Electronic resource] // SHARCS '09, 2009. http://www.hyperelliptic.org/tanja/SHARCS/ record2.