Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Comparison of Methods of Treatment of Fuzzy Information for Distribution of Access in Computer Systems

A. Shaikhanova, G. Shangytbayeva, B. Ahmetov and R. Beisembekova
Department of Computer and Software Engineering, Kazakh National Technical University, Named after K.I. Satpayev, Almaty, Kazakhstan
Research Journal of Applied Sciences, Engineering and Technology  2015  9:1082-1088
http://dx.doi.org/10.19026/rjaset.10.1877  |  © The Author(s) 2015
Received: April ‎7, ‎2015  |  Accepted: April ‎22, ‎2015  |  Published: July 25, 2015

Abstract

Method of exponentiation modular for information encryption or authentication of client using the currently wide spread cryptographic algorithm RSA was considered in paper for protection of information in the network. Fuzzy system of optimal selection of method of modular exponentiation depending on the values of performance, resistance to time analysis and permissible consumption of memory was modeled. Comparative analysis of the operations of fuzzy inference by Mamdani mechanism and by proposed method was conducted.

Keywords:

Fuzzy system, information protection, Mamdani method, modular exponentiation, RSA, time complexity,


References

  1. Brumley, D. and D. Boneh, 2005. Remote timing attacks are practical. Comput. Networks, 48(5): 701-716.
  2. Ciet, M., B. Feix and S.A. Gemalto (FR), 2008. Appl. No.12/666,892; May2, 2008; Jul.15, 2010. Montgomery-based modular exponentiation secured against hidden channel attacks. Patent US2010/0177887A1, Int. Cl.H04L9/28.
  3. Constantinescu, N. and E. Simion, 2001. Linear complexity computations of cryptographic Systems. Proceeding of IEEE International Conference on Telecommunications, Bucharest, 1: 85-89.
  4. Dubchak, L.O., 2012. Rule base of fuzzy system of choice of method of modular exponentiation. Proceeding of Modern Computer Information Technology (ACIT'2012), Ternopil, pp: 202.
  5. Gostev, V.I., S.N. Skurtov and I.V. Panchenko, 2007. Determination of control actions at the output of fuzzy controller under identical triangular membership function with increased slope. Bull. Khmelnitsk National Univ., Tech. sci., 5: 253-256.
  6. Hanley, N., R. McEvoy, M. Tunstall, C. Whelan, C. Murphy and W.P. Marnane, 2007. Correlation power analysis of large word sizes. Proceeding of Irish Signals and Systems Conference (ISSC2007), Derry, pp: 89-98.
  7. Hong, S.M., S.Y. Oh and H. Yoon, 1996. New modular multiplication algorithms for fast modular exponentiation. Proceeding of 15th Annual International Conference on Theory and ?application of ?ryptographic ?echniques (EUROCRYPT'96), Germany, pp: 166-177.
  8. Karpinski, M.P., L.O. Dubchak and N.M. Vasilkov, 2011. Protection of information on the basis of fuzzy system. Inform. Mathe. Methods Model., 1(3): 236-242.
  9. Lazarev, Y.F., 2011. Simulation of dynamic systems in Matlab. K: NTUU«KPI», pp: 421.
  10. Ozyer, T., R. Alhajj and K. Barker, 2007. Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. J. Network Comput. Appl., 30: 99-113.
  11. Powell, G.A., M.W. Wilson, K.Q. Truong, C.P. Curren, 1997. Mykotronx, Inc. (US), Appl. No.08/828,368; Mar.28, 1997; Aug. 28, 2001. High speed modular exponentiator. Patent US 6,282,290B1, Int.Cl.H04K9/28.
  12. Quisquater, J.J. and F. Koeune, 2010. Side channel attacks. State-of-the-Art Regarding Side Channel Attacks, Report, pp: 47.
  13. Ros, F.J., J.A. Martinez and P.M. Ruiz, 2014. A survey on modeling and simulation of vehicular networks: Communications, mobility and tools. Comput. Communi., 43: 1-15.
  14. Ross, T.J., 1995. Fuzzy Logic with Engineering Applications. McGraw-Hill Inc., USA, pp: 600.
  15. Shaikhanova, A.K. and G.D. Zhangisina, 2013. Parallel calculations in the organization of the network system. Bull. Semey State Univ. Shakarim, 1(61): 23-31.
  16. Shtobva, S.D., 2007. Provision of accuracy and transparency of mamdani fuzzy model during the teaching on experimental data. Prob. Manage. Inform., 4: 102-114.
  17. Vasiltsov, I.V., 2009. Special kind of attacks on crypto devices and methods of dealing with them. In: Shirochin-Kremenets, V.P. (Ed.): Publishing Center of KRHPI, pp: 264.
  18. Vasyltsov, ?., H.K. Son and E. Baek, 2005. Power and fault analysis in ECC. Proceeding of Problems and Solutions e-Smart Conference, Sophia-Anthipolis, France, pp: 101-118.
  19. Zhangissina, G., B. Zholymbet, A. Shaikhanova, D. Baiseitov, R. Pavlikov and M. Tursinova, 2014. About parallel computers. Int. J. Comput. Sci. Eng. Inform. Technol. Res., 4(2): 127-132.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved