Ihor Vasyltsov
Samsung
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ihor Vasyltsov.
cryptographic hardware and embedded systems | 2008
Ihor Vasyltsov; Eduard Hambardzumyan; Young-Sik Kim; Bohdan Karpinskyy
In this paper, a new true random number generator (TRNG), based entirely on digital components is proposed. The design has been implemented using a fast random number generation method, which is dependent on a new type of ring oscillator with the ability to be set in metastable mode. Earlier methods of random number generation involved employment of jitter, whereas the proposed method leverages the metastability phenomenon in digital circuits and applies it to a ring oscillator. The new entropy employment method allows an increase in the TRNG throughput by significantly reducing the required entropy accumulating time. Samples obtained from simulation of TRNG design have been evaluated using AIS.31 and FIPS 140-1/2 statistical tests. The results of these tests have proven the high quality of generated data. Corners analysis of the TRNG design was also performed to estimate the robustness to technology process and environment variations. Investigated in FPGA technology, phase distribution highlighted the advantages of the proposed method over traditional architectures.
information security practice and experience | 2007
Yoo-Jin Baek; Ihor Vasyltsov
The elliptic curve cryptosystem(ECC) is increasingly being used in practice due to its shorter key sizes and efficient realizations. However, ECC is also known to be vulnerable to various side channel attacks, including power attacks and fault injection attacks. This paper proposes new countermeasures for ECC scalar multiplications against differential power attacks and fault attacks. The basic idea of proposed countermeasures lies in extending the definition field of an elliptic curve to its random extension ring and performing the required elliptic curve operations over the ring. Moreover, new methods perform a point validation check in a small subring of the extension ring to give an efficient fault attack countermeasure.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security | 2015
Ihor Vasyltsov; Seung-Hwan Lee
In this paper, the theoretical approach to estimate the amount of entropy which can be extracted from heart-rate based biomedical signals has been considered. Mathematical models for estimating the values of min-entropy, Shannon entropy, and collision entropy have been created. This allows obtaining the theoretical background and estimations for upper bound of entropy that can be extracted from the biomedical inter-pulse interval signal for the usage in healthcare and biomedical applications. These results will be useful when estimating the security of healthcare systems and during the certification of the devices.
international conference of the ieee engineering in medicine and biology society | 2016
Ihor Vasyltsov; Changgyu Bak
In this paper there is proposed an approach for seamless unlock security function for mobile application. The method combines the biomedical signals measured from human body and motion signals acquired from the devices. For this purpose a wearable device and a mobile device can be securely synchronized. It is shown that entropy extracted from biomedical ECG signal is comparable to the strength of the PIN-code security, the same time giving the easiness, flexibility, and seamlessness of the usage to the user. Also, it is shown that motion sensors can provide enough precision for the correct detection of the appropriate timing to unlock device.In this paper there is proposed an approach for seamless unlock security function for mobile application. The method combines the biomedical signals measured from human body and motion signals acquired from the devices. For this purpose a wearable device and a mobile device can be securely synchronized. It is shown that entropy extracted from biomedical ECG signal is comparable to the strength of the PIN-code security, the same time giving the easiness, flexibility, and seamlessness of the usage to the user. Also, it is shown that motion sensors can provide enough precision for the correct detection of the appropriate timing to unlock device.
international conference of the ieee engineering in medicine and biology society | 2016
Ihor Vasyltsov; Changgyu Bak; Jiseung Jeong
In this paper the application of statistical approach for anomaly detection in a wearable ECG monitor has been considered. The method is based on the usage of the pre-defined expected behavior of the monitored biomedical signal and its on-line comparison with real-time measurements. Such comparison can be implemented based on the statistical model of ECG signal. To test the accuracy of the proposed method a ProSim 8 simulator was used to generate ECG signals. Our experiments showed that critical anomalies in ECG, such as Cardiac Failure, different types of Arrhythmia, and ST-segment deviations can be detected with high precision (96~100%), while false positive rate over typical NSR signal is low (<;4%). The method is scalable in terms of required performance, power consumption, and the precision of anomaly detection to be suitable for the implementation in a wearable platform.
Mathematical and Computer Modelling | 2012
Ihor Vasyltsov; Gokay Saldamli
Abstract We describe a new fault detection method in elliptic curve scalar multiplication deployments using the Montgomery power ladder. An attack based on the arithmetic properties of the Montgomery power ladder algorithm could be avoided by a clearly defined differential fault analysis countermeasure that is extremely efficient against sign-change fault analysis over prime fields. In order to give a complete analysis of the proposed countermeasure, our mathematical models are supported by some software routines implementing various schemes over prime and binary fields. According to our analysis, we report that the performance of the proposed countermeasure meets the theoretical bounds for the checking-at-the-end method, and requires reasonable overhead for the others.
intelligent data acquisition and advanced computing systems: technology and applications | 2011
Uliana Yatsykovska; Mykola Karpinski; Ihor Vasyltsov; Pavlo Bykovyy
In this article we created the mathematical model of “client to server” communication including the compromised node probabilities and a number of possible routes having an admission to access points, also comparative characteristics of DoS/DDoS attacks in computer network has been provided herewith.
Archive | 2006
Ihor Vasyltsov; Hee-Kwan Son; Yoo-Jin Baek
Archive | 2012
Ihor Vasyltsov; Karpinskyy Bohdan
Archive | 2010
Ihor Vasyltsov; Bohdan Karpinskyy