3 reports with RusCrypto: conferences with experience

    For almost 20 years, we have been participating and supporting the RusCrypto Conference as a sponsor. Its main goal is the development of the Russian commercial cryptography and information security market.

    The uniqueness of the conference is in the fusion of science, business and education.

    Initially, it was conceived with the aim of preserving and developing civil cryptography in our country. Now the topic has become a little wider.

    The event brings together representatives of regulators, mathematicians, developers and those who use cryptography in their information systems. In addition to cryptographic topics, there are always sections on reverse engineering, digital forensics.

    Materials for all years are on the conference website, those interested can look there .

    This year we decided to share with you the most interesting reports from RusCrypto.

    A review of the Grasshopper code analysis

    Section "Cryptography and Cryptanalysis"

    The authors:

    Grigory Marshalko, shopping mall 26

    Alexander Bondarenko, shopping mall 26

    Anastasia Agafonova, shopping mall 26

    From the report you will learn about the results of cryptographic studies of the block code "Grasshopper" defined by the national standard GOST R 34.12-2015 and the interstate standard GOST 34.12-2018.

    Link to the presentation of the report

    Safe software development practices as an important component of compliance with information security requirements

    Section “Information Security Software Life Cycle”

    Speaker: Nikolay Smirnov, OJSC InfoTeKS

    As you know, there are no computer programs without errors. It is believed that the number and likelihood of such errors occurring can be significantly reduced by a developer by introducing safe development practices and processes, following the recommendations of GOST R 56939-2016. Practice turns out to be different from theoretical constructions. You will learn from the report on the results of implementing safe development practices by a single vendor company.

    Link to the presentation of the report

    Using Machine Learning in IoT to Detect Malicious Activity

    Section "Advanced research in the field of cybersecurity"

    Speaker: Alexey Kushnerevich, SPIIRAS

    The author compares the accuracy and speed of machine learning tasks in the case of local and distributed launch for cybersecurity tasks. Detection of attacks on the IoT network and their classification are considered as an applied task. For distributed mode, the Spark (ML) big data processing platform is paired with Hadoop (YARN).

    If you liked the reports, please note: in March 2020, the next RusCrypto conference will be held. In contrast to this hub, there you can not only see the reports, but also personally ask questions to the speakers.

    Closer to the date, a detailed program will be known. And in the framework of the conference there is a competition of student reports. Reception of applications for the report usually starts in November. If you want to not only “see others”, but also “show yourself” - respond! The winner will have the opportunity to participate in the conference for free and make a presentation.

    Also popular now: