Koltuksuz, Ahmet

Loading...
Name Variants
Koltuksuz, A.
Koltuksuz, Ahmet Hasan
Job Title
Email Address
Main Affiliation
03.04. Department of Computer Engineering
Status
Former Staff
Website
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

NO POVERTY1
NO POVERTY
1
Research Products
ZERO HUNGER2
ZERO HUNGER
0
Research Products
GOOD HEALTH AND WELL-BEING3
GOOD HEALTH AND WELL-BEING
0
Research Products
QUALITY EDUCATION4
QUALITY EDUCATION
3
Research Products
GENDER EQUALITY5
GENDER EQUALITY
0
Research Products
CLEAN WATER AND SANITATION6
CLEAN WATER AND SANITATION
0
Research Products
AFFORDABLE AND CLEAN ENERGY7
AFFORDABLE AND CLEAN ENERGY
3
Research Products
DECENT WORK AND ECONOMIC GROWTH8
DECENT WORK AND ECONOMIC GROWTH
2
Research Products
INDUSTRY, INNOVATION AND INFRASTRUCTURE9
INDUSTRY, INNOVATION AND INFRASTRUCTURE
10
Research Products
REDUCED INEQUALITIES10
REDUCED INEQUALITIES
0
Research Products
SUSTAINABLE CITIES AND COMMUNITIES11
SUSTAINABLE CITIES AND COMMUNITIES
1
Research Products
RESPONSIBLE CONSUMPTION AND PRODUCTION12
RESPONSIBLE CONSUMPTION AND PRODUCTION
2
Research Products
CLIMATE ACTION13
CLIMATE ACTION
1
Research Products
LIFE BELOW WATER14
LIFE BELOW WATER
0
Research Products
LIFE ON LAND15
LIFE ON LAND
0
Research Products
PEACE, JUSTICE AND STRONG INSTITUTIONS16
PEACE, JUSTICE AND STRONG INSTITUTIONS
1
Research Products
PARTNERSHIPS FOR THE GOALS17
PARTNERSHIPS FOR THE GOALS
0
Research Products
Documents

24

Citations

153

h-index

5

WoS data could not be loaded because of an error. Please refresh the page or try again later.
Scholarly Output

25

Articles

0

Views / Downloads

17439/10826

Supervised MSc Theses

17

Supervised PhD Theses

0

WoS Citation Count

5

Scopus Citation Count

25

Patents

0

Projects

0

WoS Citations per Publication

0.20

Scopus Citations per Publication

1.00

Open Access Source

25

Supervised Theses

17

JournalCount
4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion, SSIRI-C 20102
Advances in Computational Methods in Sciences and Engineering1
3rd International Conference on Recent Advances in Space Technologies, RAST 20071
International Conference on Hybrid Information Technology, ICHIT 20061
International Conference on Hybrid Information Technology, ICHIT 20071
Current Page: 1 / 2

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 25
  • Master Thesis
    An Analysis of Key Generation Efficiency of Rsa Cryptosystem in Distributed Environments
    (Izmir Institute of Technology, 2005) Çağrıcı, Gökhan; Koltuksuz, Ahmet; Koltuksuz, Ahmet Hasan
    As the size of the communication through networks and especially through Internet grew, there became a huge need for securing these connections. The symmetric and asymmetric cryptosystems formed a good complementary approach for providing this security. While the asymmetric cryptosystems were a perfect solution for the distribution of the keys used by the communicating parties, they were very slow for the actual encryption and decryption of the data flowing between them. Therefore, the symmetric cryptosystems perfectly filled this space and were used for the encryption and decryption process once the session keys had been exchanged securely. Parallelism is a hot research topic area in many different fields and being used to deal with problems whose solutions take a considerable amount of time. Cryptography is no exception and, computer scientists have discovered that parallelism could certainly be used for making the algorithms for asymmetric cryptosystems go faster and the experimental results have shown a good promise so far. This thesis is based on the parallelization of a famous public-key algorithm, namely RSA.
  • Master Thesis
    A Turkish Password Cracker for Unix Based Operating Systems
    (Izmir Institute of Technology, 2001) Tahaoğlu, Osman Okyar; Koltuksuz, Ahmet; Koltuksuz, Ahmet Hasan
    UNIX and UNIX-based operating systems have been widely utilized in local area and wide area network systems that supply application and development chain of users through remote access as well as online connections. Although UNIX operating system has got powerful tools which have secure methods for user authentication, user management and for password storage, weak password choices of the users affect the entire system security negatively. This study aims to crack the password hashes which are encrypted by DES using the method of dictionary attack. The developed application is introduced and compared with the previous utilities. Password encryption, password storage, and the structure which was developed against a possible dictionary attack of UNIX are examined. The good password choosing method for the users and the system administrator are given.
  • Conference Object
    Citation - Scopus: 4
    A Model of Distributed Key Generation for Industrial Control Systems
    (Elsevier Ltd., 2012) Kılınç, Görkem; Fovino, Igor Nai; Ferigato, Carlo; Koltuksuz, Ahmet
    The cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industrial system failures on the citizen life. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to cyber-threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industrial protocols (low computational power, large geographical distribution, near to real-time constraints) make hard the effective use of traditional cryptographic schemes and in particular the implementation of an effective key management infrastructure supporting a cryptographic layer. In this paper, we describe a "model of distributed key generation for industrial control systems" we have recently implemented. The model is based on a known Distributed Key Generator protocol we have adapted to an industrial control system environment and to the related communication protocol (Modbus). To validate in a formal way selected security properties of the model, we introduced a Petri Nets representation. This representation allows for modeling attacks against the protocol and understanding some potential weaknesses of its implementation in the industrial control system environment.
  • Conference Object
    Citation - Scopus: 7
    Utilization of Timed Automata as a Verification Tool for Security Protocols
    (Institute of Electrical and Electronics Engineers Inc., 2010) Koltuksuz, Ahmet; Külahçıoğlu, Burcu; Özkan, Murat
    Timed Automata is an extension to the automata-theoretic approach for the modeling of real time systems that introduces time into the classical automata. It has become an important research area in both the context of formal languages and modeling and verification of real time systems since it was proposed by Alur and Dill in the early nineties. Timed automata proposes an efficient model checking method for verification real time systems having mature and efficient automatic verification tools. One of the application areas of timed automata is the verification of security protocols which are known to be time sensitive. This study aims to make use of timed automata as a verification tool for security protocols and gives a case study on the initial part of the Neuman- Stubblebine Repeated Authentication Protocol. © 2010 IEEE.
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 1
    Satellite Networks for Key Management
    (Institute of Electrical and Electronics Engineers Inc., 2007) Koltuksuz, Ahmet
    The cryptographic key management center is the place where all the cryptographical protocols and related keys are in action. Traditionally the key management centers operate on the ground. However; with the satellites, it is possible to conceive a space based key management center. This paper underlines the pros and cons of having a satellite networks key management center.
  • Master Thesis
    The Comparative Performance Analysis of Lattice Based Ntru Cryptosystem With Other Asymmetrical Cryptosystems
    (Izmir Institute of Technology, 2007) Mersin, Ali; Koltuksuz, Ahmet Hasan
    Current popular asymmetrical cryptosystems are based on hardness of number theoretic problems. In the future, these problems may become practically solvable with the improvements of processing power, the development of quantum computation and distributed computation. So the need for new cryptosystems which are not based on these problems has risen. Researches on hardness of lattice problems have brought a new candidate for asymmetrical cryptography: Lattice Based Cryptography. NTRU is one of these cryptosystems. For practical use, the actual performance results of NTRU with respect to current asymmetrical cryptosystems should be known. This thesis is developed based on this purpose.
  • Conference Object
    Modeling Efficient Multi-Chained Stream Signature Protocol Using Communicating Sequential Processeses
    (Institute of Electrical and Electronics Engineers Inc., 2010) Koltuksuz, Ahmet; Özkan, Murat; Külahçıoğlu, Burcu
    Communicating Sequential Processes (CSP) is a process algebra, designed for modeling and analyzing the behavior of concurrent systems. Several security protocols are modeled with CSP and verified using model-checking or theorem proving techniques successfully. Unlike other authentication protocols modeled using CSP, each of the Efficient Multi-chained Stream Signature (EMSS) protocol messages are linked to the previous messages, forming hash chains, which introduces difficulties for modeling and verification. In this paper; we model the EMSS stream authentication protocol using CSP and verify its authentication properties with model checking, by building an infinite state model of the protocol which is reduced into a finite state model. © 2010 IEEE.
  • Master Thesis
    Defining a Sample Template for Governmental Procurements of Cryptographic Products
    (Izmir Institute of Technology, 2006) Taş, Levent; Koltuksuz, Ahmet Hasan
    It is a well-known truth that nobody can easily find a law, act, directive, code or a publicly available technical specification which describe crytopgraphic-based security systems and/or cryptographic modules in Turkey. Besides that, from the international aspect, the only government released standarts take place in the "Federal Information Standarts Publication (FIPS) 140-2", published by United States "National Institute of Standarts and Technology (NIST)" on May 25th, 2001 (which became the international standart after Final Commitee Document accepted as "ISO/IEC 19790:2006" on March 9th, 2006) which specifies the security requirements that should be satisfied by a cryptographic module.Since the protection of sensitive and valuable (sometimes lifecritical) data transfered via critical governmental cryptographic systems is very important and requires high confidentiality, the need for defining a sample template technical specification of those cryptographic systems is that much high.The sample template specification which is made up in this study aims to be a starting point or initiative for preparing a cryptographic module specification in governmental procurements.
  • Conference Object
    Citation - Scopus: 2
    Crympix: Cryptographic Multiprecision Library
    (Springer Verlag, 2005) Koltuksuz, Ahmet; Hışıl, Hüseyin
    This paper delineates the results gained throughout the development of a cryptographic multiprecision1 integer library, CRYMPIX. To obtain the know-how for cryptographic computation and thus being able to create the high level cryptographic protocols in an in-housefashion are the main reasons of this development. CRYMPIX is mainly designed to supply code readability and portability plus an increased performance over other similar libraries. The whole work is achieved by detailed investigation of current algorithms and multi-precision libraries. The selected algorithms are discussed by means of efficiency and various implementation techniques. The comparative performance measurements of CRYMPIX against other multiprecision libraries show that the overall performance of CRYMPIX is not behind its predecessors if not superior.
  • Master Thesis
    The Web-Based Application of Key Exchange Protocols for Digital and Mobile Signatures
    (Izmir Institute of Technology, 2008) Akalp, Evren; Koltuksuz, Ahmet Hasan
    Many people want to communicate and send their data securely, for this reason they use encryption methods. Symmetric cryptosystems are commonly used for securing data.They are fast and reliable. But there is a problem of exchanging keys in symmetric cryptosystems. Sender and receiver must share keys to get the plain text. In this thesis, different scenarios for key exchange protocols are developed. Solutions for securing communication to block man in the middle attack are also defined in this thesis.