Questions related to Security
What is the background story of calculating the value of d in the RSA algorithm of Cryptography and Network Security?
The value of d is required for decryption. I want to know the derivation of finding d. The equation of finding d is d = e-1mod Φ(n).
Consider an example: P = 17, q = 7, n = 119, φ (n) = 96, e = 5. From here I want to find the value of d in my hand. How can I do this?
How can citizens prepare for a future projected energy crisis?
How can we protect ourselves against a future energy crisis?
How should the state transform the energy sector to make the economy more resilient to possible future energy crises?
How should the state ensure energy security for its citizens?
How should the economy be prepared for the projected increase in energy commodity prices and energy price increases?
What is your opinion on this topic?
I invite you all to discuss,
Thank you very much,
Why self driving car using Artificial Intelligence.What make them essential overcome on complexity, localization, security challenges by AI? How algorithm is useful to resolve such challenges?
I am using a Carbo-H 4x3.0mm security guard cartridge in my pre column of my HPLC. Are there compatible cleaning solutions I can run through the cartridge to extend usage?
Consider torrents is used to share packets to user in demand. How can we safeguard this process without involving unnecessary monitoring by ISP's?
I need a security dataset with challenges, I mean I want the accuracy to be low so that I can enhance it using ML techniques. I tried several datasets but they already have high accuracy without enhancement.
Quantum world appears mysterious as of now. Quantum Communications is likely to open newer dimensions in Telecommunications. Quantum key description (QKD) brings in security of by its ability to detect any attempt of intrusion/hacking. What are the Quantum Communications Technologies which may gain popularity at par with QKD ?
Can someone guide me a little? I am working on my Thesis related to IoT Security. Can you specify some major/challenging topics related to the Network Security of IoT Devices using Artificial Neural Networks? Any Precise topic/area in this field pls? Your response in this regard will be highly helpful for me. Thank you
Good day Dear Researchers. Please I would want to ask a question on cryptography. Am trying to use hybrid cryptography to secure a system, that is 3DES AND AES. Is it possible to merge both algorithms to have a unique algorithm. Or we encrypt the plaintext using the first algorithm (3DES) then the output is encrypted again using the next algorithm (AES). PLEASE, WHICH IS BETTER AND WHY?? AND WHICH IS POSSIBLE AND WHY??
Are researchers with online PHDs less likely to secure faculty positions in universities, especially in the developed world?
The AES Encryption algorithm (also known as the Rijndael algorithm) is a symmetric block cipher algorithm with a block/chunk size of 128 bits. It converts these individual blocks using keys of 128, 192, and 256 bits. Once it encrypts these blocks, it joins them together to form the ciphertext.
It is based on a substitution-permutation network, also known as an SP network. It consists of a series of linked operations, including replacing inputs with specific outputs (substitutions) and others involving bit shuffling (permutations).
In this tutorial, you will go through some of the standout features that AES offers as a globally standardized encryption algorithm.
I am a Phd student starting on my thesis journey to hopefully do good to the libraries, furthermore, lets say the main theme focus suggested by the ministy of higher education is the corporate governance and IPO instead of internal financing. and since I am highly interested in Blockchain I believe such techonology would serve corporate governance in wide range of ways, since it shares same characteristics with it (Transparency, cryptography, security etc), My question is what problem can we solve on the IPO in particular? can we assume blockchain adoption is same as corporate governance ? what variables can we use? the preferable study case (empirical ? ) I would be happy to find some insights since it is broad new topic and we need to shed lights on. thanks in advance
Quantum communications technologies (like Quantum Key distribution) are often viewed as panacea of all ills required to make data transmission in telecom network secure. The question is - Can QKD help secure the ICT systems from computer viruses and worms?
The article is here: https://www.researchgate.net/publication/360059185_Gasaq_Provably_Secure_Key_Derivation/
Kindly visit the article, and share your honest thoughts in any communication style, even if you are not an expert. Feel free to submit your thoughts here, or under the comments section of the article.
Looking forward to hear your thoughts. Let the fun debates begin!
The main features of smart homes/buildings include real-time monitoring, remote control, safety from intruders, gas/fire alarm, and so on. Because sensitive and private information is managed within smart homes/buildings, security and privacy solutions must be put in place in order to protect users/businesses' data against violation attempts as well as to guarantee the provision of reliable services. To this end, rules—in the form of policies—associated with the smart home/building resources must be defined and correctly enforced by means of a robust framework for handling the huge amount of IoT data managed.
Source: Sicari, S., Rizzardi, A., Miorandi, D. and Coen-Porisini, A. Securing the smart home: A real case study, Internet Technology Letters, 2018; 1:e22. https://doi.org/10.1002/itl2.22
N. Panwar, S. Sharma, G. Wang, S. Mehrotra, and N. Venkatasubramanian, “Verifiable round-robin scheme for smart homes,” in Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY ’19, pp. 49–60, 2019.
My inclination is to choose "No Security" within Document Properties of a PDF I'm ready to post, or are there good reasons to have security?
Greetings and Regards
What is the best blockchain for IoT data in medicine? Which blockchain is more appropriate and efficient for IoT data in health? In terms of scalability, cost, security, ... . Previously, this data was implemented with Tangel. Which blockchain is better than Tangel?
Which blockchain is more suitable for medical images and videos?
Thanks in advance.
There has been tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smartphones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern, and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems.
I am currently investigating different standards related to IoT security. I am interested in EU-related or any International standards applicable to Security aspects of IoT devices. I came across a few standards and regulations like IEC 62443, ENISA, ETSI. But I would like to know more if there are any and also any published paper or article which has covered these things and evaluated using some metric.
Can anyone please let me know if there are any more standards (relevant to software updates and Embedded Linux based IoT in particular)?
Thanks in advance.
I have 1 independent variable, being blockchain technology, and i have 5 dependent variables, supply chain efficiency, transparency, material traceability, security, and sustainability. On my survey I have 4 - 6 questions that relate to each of the 5 dependent variables and i am using SPSS to analyse my data. I am really struggling with what type of statistical analysis to use for my data, or if i can even use certain statistical methods that are inferential. As i have used a purposive sampling technique, all of my respondents work in organisations that utilise blockchain tehcnology within their supply chain. Im not looking for the relationship between the different dependent variables, i am just simply trying to understand if blockchain has improved any of these 5 dependent variables. How do i go about analysing my data if that is the case? I hope this makes sense and i hope someone can help me out.
Especially for industrial/process control systems, there is a lot of resistance to having historized data stored in the cloud as it is seen as much less secure. Is this perception correct and if so is there any evidence for it?
Irrespective of the thinking and deciding levels, cybersecurity decision-makers need to draw adequate security governance conclusions from available information that could even be insufficiently premised. On this note, what are the skillsets central to this art of drawing sufficient conclusions to protect vital infrastructure from insufficient premises?
I am writing a paper that focuses on the importance of centralizing file-based spatial that exist in data silos currently fragmented in file servers, email servers, web servers, document management systems, etc. Most of the solutions that consolidate spatial data are for database-based spatial data. However, much spatial data still exists in files and are unconsolidated.
One description missing from the paper is how enterprise spatial organisations are currently handling security of these spatial files, especially those that exist in data silos (fragmented in file servers, email servers, web servers, document management systems, etc).
Unfortunately, I do not know anyone in the enterprise GIS organisations and therefore its hard to know how these organisations store and handle the security of these data. Could anyone with an industry background please guide me.
- Are these files normally stored in data silos?
- Are there any movements towards consolidating these file data?
- Are there any software solutions that enable consolidating these spatial files?
Any online document/paper that describes this issue which I can cite would be well appreciated.
Hello, I am interested in using adult attachment styles as a moderator in my study, therefore I am interested in both the secure and insecure types [anxious & avoidant]. However the " Experiences in Close Relationships questionnaire" only measures two factors [anxious & avoidant] and I wonder how exactly I can measure the "secure type" in a proper way?
I would be very thankful if someone could clarify for me if its possible to measure secure type and how exactly the data can be analyzed?
1-Analysis of the security vulnerabilities of the protocol (MAVLink),
2- Based on the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV (ethical hacking).
mission in progress (ethical hacking). This attack can be empirically validated in a dedicated platform.
3- Development of a cyber attack detection algorithm.
4- Implementation of different encryption algorithms (i.e. AES-CBC, AES-CTR, RC4 and ChaCha20) in order to secure the MAVLINK communication against attacks.
Secure the MAVLINK communication against malicious cyber-attacks.
I am working on a security measurement framework for open source ERP software. I would like to get expert opinion on the factors that affect security attributes as defined in ISO/IEC 25010
While setting ORCiD ACCOUNT, it is observed that at website and social link place three options are given: only me, trusty agency, any one. Which option is better one for security purpose?
In an attempt to modernise the security control framework, the new version of ISO 27002:2022 is out. I wondered if anyone had looked remarkably at the latest version to determine the level of modernising that might have been in implementation.
I’m interested in views of the new format and structure, whether it achieves its aims of modernising the security control framework to meet the challenges of modern architectures?
The non-fluidity of cash currency and the frequency of developing secured, permitted and evidential rules with the Cryptos blockchain create more values within the movers of cryptocurrency agenda.
Currently, due to the data privacy and security concerns, there are less institutes willing to share their data. What can be done by both medical and computer science domain to deal with the issue?
Blockchain technologies no doubt will increase transparency and security but I assume on the other hand it will also raise issues of privacy and identity. Though this can be controlled by using private and public keys, there are still some chances to hit it. What is your take on it?
Software Experts: Ever wanted to write a book? Here's an opportunity close to it that you may not want to miss. Please see
for more details.
Hi, I develop a security VANET project with python . And I use the Blockchain in RSU . I want to simulate my project. And I don't know how to do it. Please, could you help me?
Is anyone aware of papers or studies that explore the importance of networking for growth and securing funding in start ups?
Industries have been following the DevOps culture for the last decade.
Security (Sec) term is merged now with it, and the DevSecOps is getting popular in the Research area of Software Engineering. Some Cloud-Based industries have also started to follow this and implement it in their development sector.
There are some research papers on DevSecOps, and I am trying to find the research gaps; in the meantime, if any of you can support me with your valuable answers, that would be great.
Thank you so much.
NB: If you think there is any wrong with the question, please mention it. I will highly appreciate that.
So here is my problem to solve: People arrive at the airport, first they all go through ID check as one queue. After that, they go through personal security check, and people will choose whichever queue is the shortest at the moment. The personal security check time is unif(0.5min, 1min) and the goal is to control the waiting time within a certain length. Now I need to try different configurations of the number of the people for the security check in order to satisfy the goal of controlling the waiting time. How would I be able to do that?
I now have an arena model that has a decide module in it, set up in N-way by condition, but I have no idea what condition I should give to the module. How would I get the real-time queue length so that the person can decide to go to the shortest one? Thank you!
Hi everybody :)
I am looking for a topic dissertation for my Cybersecurity MSc.
In the last period I got interested about 5G cybersecurity, with Core, RAN and O-RAN threats.
I want to ask if anyone has a interesting idea to develop that could became an interesting experimental/project thesis about cybersecurity aspects (penetration testing, security assessment) on these fields, and not just a survey.
Thank you anyone for your inputs!
I am currently choosing a topic for my PhD thesis and I have 2 topic ideas but I am a little confused on which shall I proceed with and which topic would be useful and relevant.
One is regarding incorporating AI in cybersecurity and another idea is to do on something related to Mobile App Development (Hybrid app development (security & management), Low code - No code, or using AI for mobile app development).
Are there any other hot topics that I can look into, please do suggest. Thank you so much for your time.
Would really appreciate your thoughts on this :)
Hello optogenetics community,
I am currently performing optogenetic surgeries that require me to secure optic fiber implants in place over a nucleus of interest in the mouse brain. I typically secure the implants in place using layers of Metabond, which works very well (dries quickly, minimal removing of implants). However, I understand that Metabond is effective because it actually penetrates the surface it is adhering to. Fibre optics don't work if the cladding surrounding the core is damaged. Typically in my surgeries there is a little bit of fibre exposed between the ferrule and the skull, and this get's covered with Metabond. Has anyone observed a decrease in fibre implant output if it comes in contact with Metabond?
Does the development and implementation of new information technologies for banking affect the processes of improving the security of online banking systems?
Improvement of online banking security systems can currently be significantly determined, among others, by the implementation of new information technologies for banking.
Are the processes of improving internet banking security systems currently determined by the implementation of new information technologies, i.e. by implementing banking data processing technologies in Big Data database systems, Business Intelligence based analytics, implementation of Blockchain technology and artificial intelligence.
Do you think that the processes of improving internet banking security systems are currently determined by the implementation of new information technologies for banking?
I am willing to do my Ph.D. thesis on Digital Image Processing. Kindly suggest me the topic in Medical, Defence, Forensic or Security applications.
I would be very grateful for this.
Thanks in advance :)
DNSSEC is the security extension of DNS and it is recommended to enable DNSSEC in all zones to mitigate DNS cache poisoning attacks. KSK (Key signing key) and ZSK (zone signing key) are used to generate RRSIGs of the zone records and the algorithms used to generate KSK/ZSK is very important in generating strong RRSIGs. Some of the zones has used SHA-1 as the security algorithm for KSK and ZSK. As the SHA-1 is an outdated algorithm, it is required to change the key algorithm in those zones. Anyone having any experiences in DNSSEC key algorithm roll over process, please let me know.
I would appreciate if you could help me collecting material/syllabus/slides/textbook/others for a new course entitled "Secure Assembly Coding "
Course Description: "This course aims to provide an overview of Assembly Language Fundamentals of Penetration Testing. Assembly language is most used programming languages in reverse engineering. It helps to understand any malware. It is used to analyze the flaw of any malware. Specific topics to be covered in this knowledge unit must at least include computer systems, data representation, numbering systems, instruction execution, symbolic coding, data word definition, laterals, location counter, indexing, indirect addressing, relative addressing, and assembly systems, reverse engineering (it tells complete working process of any application.), malwares and analyze the flaw of any malware".
Thanks in advance
In RSA cryptosystem, we generally take 1024 bits long prime numbers p and q. Is any problem if we take 512 bits long prime numbers? What are the security issues may be generated in real time scenario?
Currently, I am exploring federated learning (FL). FL seems going to be in trend soon because of its promising functionality. Please share your valuable opinion regarding the following concerns.
- What are the current trends in FL?
- What are the open challenges in FL?
- What are the open security challenges in FL?
- Which emerging technology can be a suitable candidate to merge with FL?
Thanks for your time.
Supervised, Unsupervised, Reinforcement, Deep learning, and federated learning (FL) are classical and contemporary techniques of machine learning. Each technique has its own advantages and disadvantages. FL does not exchange the local data samples across the edge devices, instead, it shares the model with other participating devices. Moreover, the Security and privacy of the network are also key factors in a wireless network. Therefore, Choosing an ML technique that also provides security and privacy is the need of the hour. My question is related to the security provided by federated learning. Is Federated learning secure as compared to other Machine learning techniques?
Which is your favorite IoT security related article?
We just published an interesting article regarding to "IoT magic hashes".
"The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments"
Any comments and new ideas are welcome.