encryption systems with wandering keys

Download Encryption Systems With Wandering Keys

If you can't read please download the document

Upload: zgureanu-aureliu

Post on 22-Oct-2015

39 views

Category:

Documents


1 download

DESCRIPTION

Encryption Systems based on Boolean Functions

TRANSCRIPT

  • PROCEEDINGS OF

    ITSEC-2012

    International Conference on

    II{FORMATION TECHI\OLOGIESAI\D SECTJRITY 2012

    Chisinauo Republic of Moldova15 - 16 October 2012

    Veacheslav Perju,Editor

    PROCEEDINGS

    SEC

  • CONTENTS

    PREFACE

    I CONFERENCE DATA

    SESSION 1. GENERAL INFORMATIONAL SECURITY PROBLEMSCyber Warfare: Threats and Solutions. Zavalski Igor - Ministry of Defense of Moldova

    Evolution of Cyber Crime. Purici Dumitru - General Prosecutor Office of Republic ofMoldovaThe Specifics of the Information Security. Rusnac Andrei - Information and Security 32Service of Republic of MoldovaInsuring the Cyber Security at the Newest Electronic Services Provision. DonosAlexandru - Free Intemational University of MoldovaSome Aspects Regarding Information Security in Context of the GlobalizationProcess' Safonov Ghenadie, Hlopeanicov Claudia - Military Academy of Armed Forces ofMoldovaCreating Trust Based Access Policies to Control User Actions on Documents. DanilescuMarcel, Besliu Victor - Technical University of MoldovaMethodologies and Tools of Information Security Risk Management. Bulai R.odica,Besliu Victor - Technical University of MoldovaThe Security in Internet: the Juridical Aspects Regarding the Informational Law.Badarau Elena - State Institute of the Intemational Relationships from Moldova

    o

    9

    t t

    38

    43

    52

    62

    7 1

    71

    17

    87

    9B

    103

    114

    SESSION 2. TNFORMATION ANDSECURITYAutentification in Information Sphere.Service of Republic of MoldovaMalware. Combatering and Prevention. Catan Mihai - Information and Security Serviceof Republic of Moldova :i-The Defense Information Network for Terrorist Treats Prevention, Border Securifvand lllicit Materials Traffic Combating. Sofronescu Igor, Cebotarev Oleg - MilitaryAcademy of Armed Forces of MoldovaTracking of Motor vehicles From Aerial video Imagery using the OT-MACHcorrelation Filter. Bangalore Nagachetan, young Rupert, Birch rhilip, chatwinChristopher - University of Sussex, Brighton, UKDigital Document Protection System. Bredinschi Anatolie, Cebotari Ana - StateUniversity of Physical Education and SportProtection in the Social Networks. Rusnac Andrei - Information and Security Service ofRepublic of Moldova

    TELECOMMUNICATION SYSTEMS

    Pogribnoi Vadim - lnformation and Security

    117

  • \sesstoN 3. INTERNET cYBER SECURITY 124Patricia - lnfbrination and 124The Strategy of the Cyber Security Building' Zghlbartz

    Documentation Center on NATO in the RepLrblic of Moldova

    On the Early Detection of Threats in the Real World Based on Open-Source 133

    trnformation on the Internet. Bouma Henri, Rajadell Olga, Wormlanil. Versloot Comd,

    Wedemeijer Harry - Organization for Applied Scientific Research (T|JO), Netheriands

    Trans Border Space Trust on the Base of the Internet. Donos Alerandru - Free 145

    International University of Moldova

    Cyber Defense as a Concept. Buclis Mihail, Buruc Alexandru - Military Academy of 159

    Armed Forces of MoldovaCyber Security - a Fight Between Threats and Vulnerabilities. Ionita Daniel - The 168

    National Centre of Response to Cyber Security Incidents (CERT-RO), Romania

    Romanian Approach in Cyber Securify. Andronie-Radulescu Dana - The Nationai Centre 176

    of Response to Cyber Security lncidents, Romania

    New Trends in Security Teams for Research and Educational Networks in Moldova- 181

    Overview of automated toots for a CERT. Golubev Alexandr, Bogatencov Peter

    RENAM N.G.O.The Cyber Exercises for Protecting the Critical lnfrastructure. Maj Miroslaw - Cyber 188

    Security Foundation of PolandFuture platform for lnternet of Things. Daradkeh Yousef - University of Jordan, 192

    Jordan; Namiot Dmitry - Lomonosov Moscow State University,

    Russia

    Some Aspects of the Chilclren's Security in the Internet. Donos Alexandru - Free 202

    Intemational University of Moldova

    SESSION 4. CRYPTOGRAPHY FOR CYBER SECURITYGeneral Tendencies in PKI Development in Europe" Rusnac Andrei - Information and

    Security Service of Republic of MoidovaImplementation of PKI IDP Management Systems for Access to Resources

    of 'European

    R&E E-Infrastructures. Bogatencov Peter - RENAM N.G'O.; Pocotilenco

    Valentin - Technical University of MoldovaEncryption Systems with Wandering Keys. Bulat Mihai, Zguteanu Aureliu, Ciobanu

    Iacob- Academy of Transporl, Computer Science and Communications; Cataranciuc Sergiu

    220220

    - State University of MoldovaAboutapp ly ingder iva t ivesof .Boo leanfunc t ions inencryp t ionsys tems.Academy of Transport, Cotnputer Science and Communications

    Determination of Some Terms of Zhegalkin Polynomial. Ciobanu Iacob Academy of

    227

    238

    24"1

    255

    262

    266

    Transport, Cornputer Science and Communications

    euasigroups in Cryptology. Shcherbacov Victor - Institute of Mathematics and Computer

    Science of the Academy of Sciences of MoldovaThe use of Cryptographic Techniques RSA-m to Protect the Information in Real Time.

    Balabanov 4.,-Agaionov A., Kojukhari 1., Izvoreanu B., Moraru D., Fedorov l' - Technical

    University of Moldova

  • SESSION 5.INFORMATION SECURITY IN ECONOMICS AND BUSINESSThe Structure of Shadow Information Economics. Ohrimenco Serghei - Academy ofEconomical Studies of Moldova; Borta Grigori - National Bank of Moldovaln(rmation Security Risk Management. Jitnic Victoria - Academy of EconomicalStudies of Moldova. IT&lS Management" SRLInteraction Between Information Security Management and System of InternalControl. Pavlova Lilia - Academy of Economical Studies of MoldovaTesting as a Method of lnformationa! Systems Security Level Estimation. StoroiOxana - Academy of Economical Studies of MoldovaVulnerability Life Cycle Analysis. Borta Grigorii - National Bank of Moldova, Academyof Economical Studies of MoldovaInformation Security Issues in the Data-Orieirted Culture. Globa Galina - Intemational 317Institute of Management "lMI-NOVA"The System Economic Security of Enterprise. Kozachenko Ganna, Lyashenko Olexandra 325- Vladimir Dahl East-Ukrainian National University, Luhansk, Ukraine;.Kavun Sergii -Kharkiv National University of Economics, Kharkiv, UkrainePersonnel Security Businesses: Management Insiders. Mihus Irina, Gerasimenko Helen, 334Krasnomovets Victoria - Cherkasy National University B. Khmelnitsky, Cherkassy,ukraine; Kavun sergii - Kharkiv National university of Economics, Kharkiv, Ukraine

    284

    278278

    303

    3 1 0

    293

    SESSION 6. EDUCATION IN INFORMATIONAL SECURITYSome Educational Problems in lnformational Security. CapalanaGheorghe, Cerbu Olga- State University of MoldovaWriting Wikipedia Articles as University Class Assignments. Vladimirov Sergey -Moscow Institute of Physics and Technology (State University)Preparing of the Specialists in Information Security of License and Master Degr6e 360Levels at Free International University of Moldova. Zgureanu Aureliu, Mititelu Vitalie -Free International University of MoldovaPreparing of the Specialists in Information Security of License and Master Degree 366Levels at Technical University of Moldova. Bulai Rodica, Besliu Victor - TechnicalUniversi ty of MoldovaInformation Security in Higher Education Institutions. Dediu Artur, Deinego Nona - 369State University "Alecu Russo"; Milukas Joseph - HealthCare Subrogation Group, Shelton,USAPhD and DSC Specialists Preparing in Information Security. Canter Valeriu, Perju 3'74Veacheslav, Holban Ion - National Council for Accreditation and Attestation of Republic ofMoldovaInformation Security Research and Education Centre. Perju VeacheslavCor"rncil for Accreditation and Attestation of Republic of Moldova

    AUTHOR INDEX

    344344

    353

    - National 383

    387