Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ihor Vasyltsov is active.

Publication


Featured researches published by Ihor Vasyltsov.


cryptographic hardware and embedded systems | 2008

Fast Digital TRNG Based on Metastable Ring Oscillator

Ihor Vasyltsov; Eduard Hambardzumyan; Young-Sik Kim; Bohdan Karpinskyy

In this paper, a new true random number generator (TRNG), based entirely on digital components is proposed. The design has been implemented using a fast random number generation method, which is dependent on a new type of ring oscillator with the ability to be set in metastable mode. Earlier methods of random number generation involved employment of jitter, whereas the proposed method leverages the metastability phenomenon in digital circuits and applies it to a ring oscillator. The new entropy employment method allows an increase in the TRNG throughput by significantly reducing the required entropy accumulating time. Samples obtained from simulation of TRNG design have been evaluated using AIS.31 and FIPS 140-1/2 statistical tests. The results of these tests have proven the high quality of generated data. Corners analysis of the TRNG design was also performed to estimate the robustness to technology process and environment variations. Investigated in FPGA technology, phase distribution highlighted the advantages of the proposed method over traditional architectures.


information security practice and experience | 2007

How to prevent DPA and fault attack in a unified way for ECC scalar multiplication: ring extension method

Yoo-Jin Baek; Ihor Vasyltsov

The elliptic curve cryptosystem(ECC) is increasingly being used in practice due to its shorter key sizes and efficient realizations. However, ECC is also known to be vulnerable to various side channel attacks, including power attacks and fault injection attacks. This paper proposes new countermeasures for ECC scalar multiplications against differential power attacks and fault attacks. The basic idea of proposed countermeasures lies in extending the definition field of an elliptic curve to its random extension ring and performing the required elliptic curve operations over the ring. Moreover, new methods perform a point validation check in a small subring of the extension ring to give an efficient fault attack countermeasure.


Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security | 2015

Entropy Extraction from Bio-Signals in Healthcare IoT

Ihor Vasyltsov; Seung-Hwan Lee

In this paper, the theoretical approach to estimate the amount of entropy which can be extracted from heart-rate based biomedical signals has been considered. Mathematical models for estimating the values of min-entropy, Shannon entropy, and collision entropy have been created. This allows obtaining the theoretical background and estimations for upper bound of entropy that can be extracted from the biomedical inter-pulse interval signal for the usage in healthcare and biomedical applications. These results will be useful when estimating the security of healthcare systems and during the certification of the devices.


international conference of the ieee engineering in medicine and biology society | 2016

Method for seamless unlock function for mobile applications

Ihor Vasyltsov; Changgyu Bak

In this paper there is proposed an approach for seamless unlock security function for mobile application. The method combines the biomedical signals measured from human body and motion signals acquired from the devices. For this purpose a wearable device and a mobile device can be securely synchronized. It is shown that entropy extracted from biomedical ECG signal is comparable to the strength of the PIN-code security, the same time giving the easiness, flexibility, and seamlessness of the usage to the user. Also, it is shown that motion sensors can provide enough precision for the correct detection of the appropriate timing to unlock device.In this paper there is proposed an approach for seamless unlock security function for mobile application. The method combines the biomedical signals measured from human body and motion signals acquired from the devices. For this purpose a wearable device and a mobile device can be securely synchronized. It is shown that entropy extracted from biomedical ECG signal is comparable to the strength of the PIN-code security, the same time giving the easiness, flexibility, and seamlessness of the usage to the user. Also, it is shown that motion sensors can provide enough precision for the correct detection of the appropriate timing to unlock device.


international conference of the ieee engineering in medicine and biology society | 2016

Statistical approach for lightweight detection of anomalies in ECG

Ihor Vasyltsov; Changgyu Bak; Jiseung Jeong

In this paper the application of statistical approach for anomaly detection in a wearable ECG monitor has been considered. The method is based on the usage of the pre-defined expected behavior of the monitored biomedical signal and its on-line comparison with real-time measurements. Such comparison can be implemented based on the statistical model of ECG signal. To test the accuracy of the proposed method a ProSim 8 simulator was used to generate ECG signals. Our experiments showed that critical anomalies in ECG, such as Cardiac Failure, different types of Arrhythmia, and ST-segment deviations can be detected with high precision (96~100%), while false positive rate over typical NSR signal is low (<;4%). The method is scalable in terms of required performance, power consumption, and the precision of anomaly detection to be suitable for the implementation in a wearable platform.


Mathematical and Computer Modelling | 2012

Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography

Ihor Vasyltsov; Gokay Saldamli

Abstract We describe a new fault detection method in elliptic curve scalar multiplication deployments using the Montgomery power ladder. An attack based on the arithmetic properties of the Montgomery power ladder algorithm could be avoided by a clearly defined differential fault analysis countermeasure that is extremely efficient against sign-change fault analysis over prime fields. In order to give a complete analysis of the proposed countermeasure, our mathematical models are supported by some software routines implementing various schemes over prime and binary fields. According to our analysis, we report that the performance of the proposed countermeasure meets the theoretical bounds for the checking-at-the-end method, and requires reasonable overhead for the others.


intelligent data acquisition and advanced computing systems: technology and applications | 2011

The monitoring system of DoS/DDoS attacks in the global network

Uliana Yatsykovska; Mykola Karpinski; Ihor Vasyltsov; Pavlo Bykovyy

In this article we created the mathematical model of “client to server” communication including the compromised node probabilities and a number of possible routes having an admission to access points, also comparative characteristics of DoS/DDoS attacks in computer network has been provided herewith.


Archive | 2006

Cryptographic method and system for encrypting input data

Ihor Vasyltsov; Hee-Kwan Son; Yoo-Jin Baek


Archive | 2012

APPARATUS FOR GENERATING RANDOM NUMBER

Ihor Vasyltsov; Karpinskyy Bohdan


Archive | 2010

Random Number Generators Having Metastable Seed Signal Generators Therein

Ihor Vasyltsov; Bohdan Karpinskyy

Collaboration


Dive into the Ihor Vasyltsov's collaboration.

Researchain Logo
Decentralizing Knowledge