Research Article | OPEN ACCESS
Comparison of Methods of Treatment of Fuzzy Information for Distribution of Access in Computer Systems
A. Shaikhanova, G. Shangytbayeva, B. Ahmetov and R. Beisembekova
Department of Computer and Software Engineering, Kazakh National Technical University,
Named after K.I. Satpayev, Almaty, Kazakhstan
Research Journal of Applied Sciences, Engineering and Technology 2015 9:1082-1088
Received: April 7, 2015 | Accepted: April 22, 2015 | Published: July 25, 2015
Abstract
Method of exponentiation modular for information encryption or authentication of client using the currently wide spread cryptographic algorithm RSA was considered in paper for protection of information in the network. Fuzzy system of optimal selection of method of modular exponentiation depending on the values of performance, resistance to time analysis and permissible consumption of memory was modeled. Comparative analysis of the operations of fuzzy inference by Mamdani mechanism and by proposed method was conducted.
Keywords:
Fuzzy system, information protection, Mamdani method, modular exponentiation, RSA, time complexity,
References
-
Brumley, D. and D. Boneh, 2005. Remote timing attacks are practical. Comput. Networks, 48(5): 701-716.
-
Ciet, M., B. Feix and S.A. Gemalto (FR), 2008. Appl. No.12/666,892; May2, 2008; Jul.15, 2010. Montgomery-based modular exponentiation secured against hidden channel attacks. Patent US2010/0177887A1, Int. Cl.H04L9/28.
-
Constantinescu, N. and E. Simion, 2001. Linear complexity computations of cryptographic Systems. Proceeding of IEEE International Conference on Telecommunications, Bucharest, 1: 85-89.
-
Dubchak, L.O., 2012. Rule base of fuzzy system of choice of method of modular exponentiation. Proceeding of Modern Computer Information Technology (ACIT'2012), Ternopil, pp: 202.
-
Gostev, V.I., S.N. Skurtov and I.V. Panchenko, 2007. Determination of control actions at the output of fuzzy controller under identical triangular membership function with increased slope. Bull. Khmelnitsk National Univ., Tech. sci., 5: 253-256.
-
Hanley, N., R. McEvoy, M. Tunstall, C. Whelan, C. Murphy and W.P. Marnane, 2007. Correlation power analysis of large word sizes. Proceeding of Irish Signals and Systems Conference (ISSC2007), Derry, pp: 89-98.
-
Hong, S.M., S.Y. Oh and H. Yoon, 1996. New modular multiplication algorithms for fast modular exponentiation. Proceeding of 15th Annual International Conference on Theory and ?application of ?ryptographic ?echniques (EUROCRYPT'96), Germany, pp: 166-177.
-
Karpinski, M.P., L.O. Dubchak and N.M. Vasilkov, 2011. Protection of information on the basis of fuzzy system. Inform. Mathe. Methods Model., 1(3): 236-242.
-
Lazarev, Y.F., 2011. Simulation of dynamic systems in Matlab. K: NTUU«KPI», pp: 421.
-
Ozyer, T., R. Alhajj and K. Barker, 2007. Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. J. Network Comput. Appl., 30: 99-113.
-
Powell, G.A., M.W. Wilson, K.Q. Truong, C.P. Curren, 1997. Mykotronx, Inc. (US), Appl. No.08/828,368; Mar.28, 1997; Aug. 28, 2001. High speed modular exponentiator. Patent US 6,282,290B1, Int.Cl.H04K9/28.
-
Quisquater, J.J. and F. Koeune, 2010. Side channel attacks. State-of-the-Art Regarding Side Channel Attacks, Report, pp: 47.
-
Ros, F.J., J.A. Martinez and P.M. Ruiz, 2014. A survey on modeling and simulation of vehicular networks: Communications, mobility and tools. Comput. Communi., 43: 1-15.
-
Ross, T.J., 1995. Fuzzy Logic with Engineering Applications. McGraw-Hill Inc., USA, pp: 600.
-
Shaikhanova, A.K. and G.D. Zhangisina, 2013. Parallel calculations in the organization of the network system. Bull. Semey State Univ. Shakarim, 1(61): 23-31.
-
Shtobva, S.D., 2007. Provision of accuracy and transparency of mamdani fuzzy model during the teaching on experimental data. Prob. Manage. Inform., 4: 102-114.
-
Vasiltsov, I.V., 2009. Special kind of attacks on crypto devices and methods of dealing with them. In: Shirochin-Kremenets, V.P. (Ed.): Publishing Center of KRHPI, pp: 264.
-
Vasyltsov, ?., H.K. Son and E. Baek, 2005. Power and fault analysis in ECC. Proceeding of Problems and Solutions e-Smart Conference, Sophia-Anthipolis, France, pp: 101-118.
-
Zhangissina, G., B. Zholymbet, A. Shaikhanova, D. Baiseitov, R. Pavlikov and M. Tursinova, 2014. About parallel computers. Int. J. Comput. Sci. Eng. Inform. Technol. Res., 4(2): 127-132.
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|