📜 ⬆️ ⬇️

3 reports with RusCrypto: conferences with experience



For almost 20 years we have been participating and supporting the RusCrypto conference in the status of a sponsor. Its main goal is the development of the Russian commercial cryptography and information security market.


The uniqueness of the conference in the fusion of science, business and education.




Initially, she was conceived with the aim of preserving and developing civil cryptography in our country. Now the subject has become a little wider.



')

The event brings together representatives of regulators, mathematics, developers and those who use cryptography in their information systems. In addition to cryptographic topics, there are always sections on reverse, digital forensics.




Materials for all years are on the conference website, interested can look there .




This year we decided to share with you the most interesting reports with RusCrypto.



Review of the results of the analysis of the cipher "Grasshopper"


Section "Cryptography and Cryptanalysis"


The authors:


Gregory Marshalko, TC 26


Alexander Bondarenko, TC 26


Anastasia Agafonova, TC 26


From the report you will learn about the results of cryptographic studies of the Grasshopper block cipher, defined by the national standard GOST R 34.12-2015 and the interstate standard GOST 34.12-2018.




Link to the presentation of the report

Practices of safe software development as an important component of compliance with information security requirements


Section "Life Cycle of Information Security Software"


Speaker: Nikolay Smirnov, OAO InfoTeKS


As you know, there are no computer programs without errors. There is an opinion that the developer can significantly reduce the number and probability of such errors by introducing practices and processes of safe development, following the recommendations of GOST R 56939-2016. Practice turns out to be different from theoretical constructions. You will learn from the report on the results of implementing safe practices by a single vendor company.





Link to the presentation of the report

Using machine learning in IoT to detect malicious activity


Section "Advanced Cybersecurity Research"


Speaker: Alexey Kushnerevich, SPIIRAN


The author compares the accuracy and speed of machine learning tasks in the case of local and distributed start up for cybersecurity tasks. Detection of attacks on the IoT network and their classification is considered as an applied problem. For distributed mode, Spark Big Data Processing Platform (ML) is used in conjunction with Hadoop (YARN).




If you like the reports, please note: in March 2020, the next RusCrypto conference will take place. In contrast to this, it will be possible not only to see the reports, but also personally ask questions to the speakers.


Closer to the date will be known detailed program. And within the framework of the conference there is a competition of student reports. Reception of applications for the report starts usually in November. If you want to not only “see others”, but also “show yourself” - respond! The winner will have the opportunity to take part in the conference free of charge and make a presentation.

Source: https://habr.com/ru/post/449266/


All Articles