• INFORMATION SECURITY

    Comparison of Convolutional Codes and Random Codes Based on Quasigroups for transmission in BSC

    Security & Future, Vol. 5 (2021), Issue 3, pg(s) 98-101

    Error-correcting codes are widely used in modern coding theory, and their applications in networks and communication cannot be omitted. Together with the error detecting codes, they are the core of every possible transmission and communication. In coding theory, information theory and telecommunications, error-correcting codes are used to control errors in data which are transmitted over different communication channels. Convolutional block codes are one of the most popular error-correcting codes which are applied in many networks. On the other side, Random Codes Based on Quasigroups (RCBQ) are cryptcodes defined elsewhere. These codes provide a correction of a certain number of errors in the transmitted data and an information security in one algorithm. There are a few modifications of RCBQ, but here we will consider performances of Cut-Decoding algorithm. In this paper, we investigate and compare the bit error probability (BER) of these two codes for rate 1/4 and different values of bit-error probability in the binary symmetric channel. From the obtained experimental results, we conclude that for lower bit-error probability in the binary symmetric channel, the RCBQs are slightly better than convolutional codes. The advantage of RCBQs is that they have some cryptographic properties, but convolutional codes are faster than RCBQs.

  • INFORMATION SECURITY

    Some general traits of the e-cash system and a review of a compact e-cash scheme with practical and complete tracing

    Security & Future, Vol. 4 (2020), Issue 3, pg(s) 107-110

    The e-cash methodology has its advantages compared to other payment systems and it has brought big changes to the way business is being conducted. Money becomes an intangible item and travels electronically across the world in a widely open network that might expose it to risks. This means that secure end-to-end connections are needed and many different cryptographic algorithms are used to achieve it. In this paper we will go through the main metrics that characterize them and the main properties of the e-cash system. Finally, a review of a compact e-cash scheme with practical and complete tracing will be given.

  • Secure big data and IoT with implementation of blockchain

    Security & Future, Vol. 2 (2018), Issue 4, pg(s) 183-185

    BlockChain is a distributed database of records or public ledger of all time stamped transactions saved in all computers in one peer-to-peer network. It allows a secure and transparent transfer of digital goods including money and intellectual property. Bitcoin – a digital decentralized cryptocurrency, is the first application of BlockChain. The second application is an agreement called Smart contract that enables exchanging a value or assets between two owners based on a set of conditions included in the contract.

    In this paper, we analyze the possibilities for application of BlockChain in Big Data and IoT. Implementation of BlockChain in Big Data confirms that data is accurate and secure and sharing of data will become more simple. In industries like financial services, government and healthcare there is a need to combine BlockChain and Big Data because these industries have repositories full of important data. They must store and share these large amounts of data. Implementation of BlockChain technology provides security of data and ensures its integrity when shared. BlockChain technology is also seen as a way to secure the Internet of Things (IoT). Application of BlockChain in IoT enables IoT devices to participate in BlockChain transactions and invents new styles of digital interactions. This technology will provide a simple infrastructure for devices to directly and securely transfer data or money using Smart contract.