Computer Science and Cybersecurity
https://periodicals.karazin.ua/cscs
<p>International electronic scientific-theoretical journal. </p> <p>The journal publishes research articles on theoretical, scientific and technical problems of effective facilities development for computer information communication systems and on information security problems based on advanced mathematical methods, information technologies and technical means.</p> <p>The target audience: scientists, teachers, graduate students, students, specialists of IT-sphere and all who are interested in issues of information security and problems of creating and operating information and communication systems.</p>V.N. Karazin National Universityen-USComputer Science and Cybersecurity2519-2310EVALUATION AND COMPARISON OF CRYPTOGRAPHIC DIGITAL SIGNATURE TRANSFORMATIONS OF THE ADDITIONAL NIST COMPETITION «DIGITAL SIGNATURE SCHEMES»
https://periodicals.karazin.ua/cscs/article/view/2519-2310-2025-1-01
<p><span style="font-weight: 400;"> In the modern world, the development of quantum computing threatens classical cryptographic algorithms, in particular RSA, ECDSA and DSA, which are used to ensure digital security. This creates a need to develop post-quantum cryptographic solutions that can be resistance under quantum computers attacks. Stable digital signature algorithms are especially important, as they provide authentication, integrity and non-repudiation of information in financial, legal and government systems. The article analyzes and compares cryptographic digital signature schemes participating in the NIST supplementary competition “Digital Signature Schemes”. The main mathematical foundations of these algorithms are investigated, in particular, lattice cryptography, code-based schemes, multivariate transformations, elliptic curve isogenies and MPC-in-the-Head methods. Their performance, security and efficiency in the context of post-quantum threats are assessed. A detailed analysis of the length of public keys, signatures and the speed of key generation, signing and verification operations is carried out. The main advantages and disadvantages of each approach are identified, promising directions for the development of post-quantum digital signatures and their possible practical application are identified. The research is relevant in connection with the need to transition to new cryptographic standards that will guarantee data security in the future. The results allow to assess the strengths and weaknesses of the considered algorithms, as well as to identify promising directions for the further researches of post-quantum cryptography.</span></p>Ivan GorbenkoYelyzavetа OstrianskaVolodymyr Ponomar
Copyright (c) 2025 Computer Science and Cybersecurity
https://creativecommons.org/licenses/by/4.0/
2025-07-152025-07-15161610.26565/2519-2310-2025-1-01SPEECH TECHNOLOGY FOR CONTROLLING ELECTRONIC DEVICES
https://periodicals.karazin.ua/cscs/article/view/2519-2310-2025-1-02
<p><span style="font-weight: 400;">This paper presents a system that employs the use of speech technology to control electronic devices attached to PCs. The work in this paper is implemented in two major phases. Phase one is the software part of the system. Its role is to accept voice signals from a microphone attached to the PC and perform speech recognition on the signal, determine operating commands from the recognized phrases and control devices attached to the computer ports. Phase two is a hardware logic circuit connected between the PC's printer port and the devices being controlled. This logic circuit which is implemented using simple logic gates performs addressing and control mode for the electronic devices being controlled. The system runs on windows vista operating system and it is capable of authenticating users and validating their action. User response for the system is provided in both voice response and graphic display messages.</span></p>Mhnd Farhan
Copyright (c) 2025 Computer Science and Cybersecurity
https://creativecommons.org/licenses/by/4.0/
2025-07-152025-07-151173210.26565/2519-2310-2025-1-02DEVELOPMENT OF A UNIVERSAL ENERGY-EFFICIENT AUTOMATED METER READING SYSTEM USING ESP32-CAM
https://periodicals.karazin.ua/cscs/article/view/2519-2310-2025-1-03
<p><span style="font-weight: 400;"> The article discusses the design and development of a universal automated meter reading system capable of handling multiple resource types, including water, gas, and electricity. The developed system addresses common challenges associated with manual meter reading, such as accessibility, inconsistent data recording, and human error. The primary innovation presented is integrating the ESP32-CAM module to automate image capturing and data transmission to utility services through a user-friendly mobile application. Special emphasis is placed on optimizing energy efficiency to ensure extended device autonomy. The proposed system includes a robust algorithm for image preprocessing, meter reading validation, and secure wireless communication. Rigorous testing across Android and iOS platforms demonstrated the application's usability, functionality, and consistent performance. Optimization efforts significantly improved device battery life from approximately 50 days to four months. Future improvements are suggested, including developing a custom hardware board to reach the industry-standard operational duration of one year.</span></p>Tetiana KorobeynikovaOleksandr ReminnyiRoman BaitalaVladyslav KyrykDanylo Stetskyi
Copyright (c) 2025 Computer Science and Cybersecurity
https://creativecommons.org/licenses/by/4.0/
2025-07-152025-07-151334010.26565/2519-2310-2025-1-03MODELING AND EVALUATION OF THE COMPUTATIONAL COMPLEXITY OF THE MAIN PROCEDURES, THE INITIAL STAGES OF THE HYBRID STEGANOGRAPHIC ALGORITHM
https://periodicals.karazin.ua/cscs/article/view/2519-2310-2025-1-04
<p><strong> </strong><span style="font-weight: 400;">In today's environment of increasing cyber threats, steganography plays a key role in ensuring data confidentiality by hiding it in digital data arrays (images, sound, file systems, etc.). Unlike cryptography, steganography hides the very fact of information transfer, which makes it indispensable for data protection in information and communication systems with limited resources. The need to create energy-efficient and adaptive algorithms that combine content robustness, high container quality, and low computational complexity emphasizes the relevance of the research conducted. The paper evaluates the computational complexity of input data preprocessing procedures and determines their impact on the efficiency of subsequent data encapsulation. As a basis for modeling, one of the possible variants of smoothing low-informative areas of the source images was selected. The following assessments were carried out: - performance by execution time for different types of images; PSNR metric; probability of color brightness difference and number of formed basic blocks (BBs) of images. During the modeling, the consequences of smoothing the textures of the source images were investigated in the conditions of varying smoothing matrix sizes and the value of the pixel brightness difference. The number of basic operations (arithmetic, logical, comparisons) for each block was calculated and the overall complexity of the corresponding stages of the algorithm was determined. The experimental evaluation was performed by measuring the execution time of the procedures, evaluating the image quality using the PSNR metric, calculating the probability of brightness difference, and counting the number of formed series of BBs. To evaluate the effectiveness of the investigated procedures, test images with different textural characteristics were used. The obtained results confirmed that the pre-smoothing stage improves the initial conditions for the formation of BBs series (compared to their absence). The introduction of the smoothing stage ensures noise reduction in low-information areas, which contributes to increased block homogeneity and expands the range of combinatorics of available encoding parameters (as a way to counteract attempts at unauthorized content extraction). Flexible settings for block size and brightness coarsening threshold values for image elements allow the smoothing process to be adapted to different image types and the current resource limitations of the hardware platforms used. The proposed approach to preprocessing data creates the necessary conditions for forming BBs series, improves content robustness, and maintains a low level of visual distortion. Adaptive settings for smoothing parameters allow the algorithm to be used effectively on platforms with limited resources.</span></p>Mykyta HoncharovSerhii Malakhov
Copyright (c) 2025 Computer Science and Cybersecurity
https://creativecommons.org/licenses/by/4.0/
2025-07-152025-07-151415910.26565/2519-2310-2025-1-04RESEARCH AND COMPARISON OF EUROPEAN UNION REGULATORY DOCUMENTS IN CYBERSECURITY
https://periodicals.karazin.ua/cscs/article/view/2519-2310-2025-1-05
<p><span style="font-weight: 400;">The article presents a thorough study and comparison of the main regulatory acts of the European Union in the field of cybersecurity, including: NIS2 Directive, General Data Protection Regulation (GDPR), Digital Operational Resilience Regulation (DORA) and PCI DSS standard. These documents are considered fundamental elements in shaping the EU's current policy on digital information protection, covering personal data, financial information and critical infrastructure. The paper outlines the key objectives of each of the acts, analyses their scope of application, requirements for regulated entities, risk management mechanisms, incident reporting, interaction with suppliers, and sanction provisions. Particular attention is paid to comparing the acts in terms of their impact on business and IT infrastructure, as well as identifying the interrelationships between them. It has been established that although each document has its own focus - personal data protection, financial infrastructure resilience, digital network security, or payment card transaction protection - they are all aimed at creating a comprehensive cyber security ecosystem within the EU. The article also analyses international analogues of these acts, such as GDPR-like laws in the United States and Brazil, NIST and ISO standards, which demonstrates the global nature of the digital security problem and the search for common approaches to solving it. In conclusion, the paper emphasises the importance of a comprehensive and harmonised approach to cybersecurity as a key condition for the sustainable development of a digital society. Given the current threats, in particular geopolitical conflicts and the growing scale of cybercrime, the effective implementation of European standards is of particular importance for partner countries, in particular Ukraine, which needs to adapt the relevant standards to enhance national cyber resilience.</span></p>Maryna YesinaYelyzaveta LohachovaIevgeniia Kolovanova
Copyright (c) 2025 Computer Science and Cybersecurity
https://creativecommons.org/licenses/by/4.0/
2025-07-152025-07-151607210.26565/2519-2310-2025-1-05