Yazar "Eyüpoğlu, Can" seçeneğine göre listele
Listeleniyor 1 - 20 / 25
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Ağ ortamındaki saldırı türleri: saldırı senaryo örnekleri(İstanbul Ticaret Üniversitesi, 2023) Kılınç, Fırat; Eyüpoğlu, CanÇağımızda bilgi teknolojileri hızla gelişirken mobil ve nesnelerin interneti (Internet of Things-IoT) cihazlarının yaygınlaşması ile birlikte siber saldırganlar da her geçen gün yeni saldırı yöntemleri geliştirmektedir. Bu nedenle siber saldırılar kullanıcılarda büyük endişe yaratmakta ve bu endişelerin de giderek artacağı öngörülmektedir. Bu süreçte Saldırı Tespit Sistemleri (Intrusion Detection System-IDS) ve Saldırı Önleme Sistemleri (Intrusion Prevention System-IPS) önemli bir rol almaktadır. Bu çalışmada ilk olarak ağ güvenlik duvarları, ağ saldırıları ve ağ ortamında gerçekleşen saldırı türlerine yer verilmiştir. Sonrasında ağ saldırı türleri için örnek senaryolar oluşturulmuş ve bu senaryolar üzerinde saldırıların nasıl gerçekleştirildiği açıklanmıştır. Saldırı türleri, Kanada İletişim Güvenliği Kuruluşu (Canada Communications Security Establishment-CSE) ve Kanada Siber Güvenlik Enstitüsü (Canadian Institute for Cybersecurity-CIC) tarafından yaratılan saldırı tespit sistemi değerlendirme veri setlerinde (CIC-IDS2017 ve CES-CIC-IDS2018) yer alan ve saldırganlar tarafından yaygın olarak kullanılan hizmet reddi saldırısı (Denial of Service Attack-DoS), dağıtık hizmet reddi saldırısı (Distrubuted Denial of Service-DDoS), botnet, kaba kuvvet, port tarama, web uygulama ve sızma saldırıları olarak belirlenmiştir.Öğe Balküplerinin saldırı ve savunma açısından incelenmesi(İstanbul Ticaret Üniversitesi, 2023) Karabay, Muhammed Sadık; Eyüpoğlu, CanGeçtiğimiz son 20 yıldaki teknolojik gelişmelerle beraber bilgisayar ağlarının kapasitesi ve bağlanan cihaz sayısı sürekli artmaktadır. Özellikle nesnelerin interneti (Internet of Things-IoT) teknolojisi ile internete bağlı cihaz sayısının 50 milyarı aşması beklenmektedir. Son kullanıcı tarafından kullanılan akıllı cihazlar ve bu cihazların kullanımındaki artış beraberinde devasa boyutlardaki veri akışını da getirmiştir. Covid-19 süreci ile uzaktan çalışma, çevrimiçi eğitim vb. durumlar neredeyse tüm işlemleri internet üzerinden yürütmeye ve verilere internet üzerinden erişime olanak vermiştir. Tüm bunlarla beraber, verilerin saklandığı, yürütüldüğü ve işlendiği sistemler saldırganların hedefi haline gelmiştir. Bu çalışmada olası siber saldırı senaryolarında saldırganların kurumsal ağ sisteminin içine sızması durumunda saldırganların dikkatini başka yöne çekmesine olanak sağlayacak balküpü sistemleri, hem saldırgan hem de savunan bakış açısıyla ele alınmıştır.Öğe Blokzinciri tabanlı akıllı hava mühimmatı sistemi(İstanbul Ticaret Üniversitesi, 2023) Konacaklı, Enis; Eyüpoğlu, CanBlokzinciri, elli milyon dolarlık iş hacminin verdiği güçle, içinde bulunduğumuz on yılda geleceğin teknolojisi olduğunu kanıtlamıştır. İlk olarak kripto paralarla ünlenen bu teknoloji, mimari üstünlüğü sayesinde finans sektöründen lojistik yönetimine kadar pek çok alanda kullanım imkânı bulmuştur. Blokzinciri teknolojisinin kuvvetli, güvenli, denetlenebilir ve daha sonra kanıtlanabilir kayıtlara büyük ihtiyaç duyulan Hava Kuvvetleri akıllı silah sistemlerinin lojistik yönetiminde kullanılması mümkündür. Bu çalışmada blokzinciri teknolojisi kullanılarak silah sistemlerinin lojistik kayıtlarının oluşturulabileceği ve takip edilebileceği bir model tasarlanmıştır. Modele uygun olarak akıllı bir blokzinciri anlaşması yazılmıştır. Blokzincirinde gerçekleştirilebilecek bir gönderme HyperLedger Fabric çerçevesi kullanılarak örneklenmiştir. Sonuç olarak bu modelin diğer askeri lojistik takip uygulamalarında kullanılabilirliği ile ilgili bir değerlendirme yapılmıştır. Ayrıca ileride yapılabilecek çalışmalarda konunun nasıl geliştirilebileceği ile ilgili bazı çıkarımlarda bulunulmuştur.Öğe Büyük veride anonimleştirme teknikleri ve saldırı türleri: uygulama örnekleri(İstanbul Ticaret Üniversitesi, 2022) Gümüş, Hamza Talha; Eyüpoğlu, CanVeri kavramı ortaya çıktığından beri kişiye özgü olan bilgilerimiz işlenmeye başlanmıştır. Veri kavramı sonraki yıllarda kişisel veri konusunu oluşturarak veri güvenliği ve mahremiyeti kavramlarının ortaya çıkmasına sebep olmuştur. Kişiye ait ve özgü olarak tanımlanan kişisel veri kavramı mahremiyetin önemini bir kez daha vurgulamıştır. Gizlilik ya da gizli olma durumu şeklinde tanımlanan mahremiyet kavramı, her geçen gün veriler geliştikçe ve arttıkça daha fazla oranda önem kazanmaktadır. Son yıllarda araştırmacılar tarafından farklı anonimleştirme teknikleri geliştirilmiş ve bu teknikler sayesinde veri koruması artırılmıştır. Veri mahremiyeti önem kazanırken veri hırsızlığı kavramı da ortaya çıkmış ve belirli saldırı türleri geliştirilmiştir. Bu saldırı türlerine yönelik geliştirilen anonimleştirme teknikleri, veri kaybına yol açsa da kişisel veriye ulaşma ihtimalini büyük ölçüde azaltmaktadır. Bu çalışmada büyük veride anonimleştirme teknikleri ve saldırı türleri incelenmiş ve mahremiyet koruması konusu üzerinde durulmuştur.Öğe Çocuklara yönelik akıllı saatlerin siber güvenlik ve mahremiyet açısından incelenmesi(İstanbul Ticaret Üniversitesi, 2024) Uluç, Cafer; Eyüpoğlu, CanAkıllı saat, içerisinde bulunan bileşen ve servislerle kullanıcının bileğine taktığı küçük bir bilgisayardır. Cep telefonuyla bağlantılı hareket eden bu cihaz, telefonun tüm kabiliyetleriyle donanabilmektedir. Akıllı saatler metropol kentlerinin dinamik yaşamında güvenilir bir yardımcı mı yoksa iyi niyetli görünen ve gönüllü olarak eşlik edilmesine izin verilen casus cihazlar mıdır? Bu çalışmada, özellikle akıllı çocuk saatlerinin gerek ekonomik erişilebilirlik gerek ürüne ulaşımdaki kolaylığın her geçen gün artması ile orantılı olarak yaygınlaşmasıyla yaşanan ve yaşanabilecek kişisel verilerin ve mahremiyetin ihlali üzerinde durulmaktadır. Ayrıca akıllı saatler üzerinde yapılan teknik incelemeler ile endişe verici sonuçlara ulaşılmıştır. Çalışma kapsamında teknik incelemelere ayrıntılı olarak yer verilmekle birlikte olası güvenlik ve mahremiyet riskleri incelenmekte, önleyici unsurlar aktarılmakta ve konuya Türkiye perspektifinden yaklaşılarak güvenlik önerilerinde bulunulmaktadır. Bu çalışma aracılığıyla toplumsal siber güvenlik direncinin artırılması ve araştırmacılara IoT (Internet of Things-Nesnelerin İnterneti) cihazlarında tersine mühendislik çalışmaları için fikir verilmesi amaçlanmaktadır.Öğe Design and implementation of a programmable logic controller using PIC18F4580(Institute of Electrical and Electronics Engineers Inc., 2018) Şanver, Ufuk; Yavuz, Erdem; Eyüpoğlu, Can; Uzun, TuncayUse of electricity in industry opened a new age which is dominated by industrial automation. In the beginning, automation systems were based on electro-mechanical systems consisting of relays and contactors. Developments in semiconductor technology inevitably transformed the existing structure and cause electronic-controlled Programmable Logic Controller (PLC) to prevail in the automation systems. PLCs consist of a microcontroller/microprocessor, relay or transistor for switching, isolating equipment such as opto-couplers and voltage converter/inverters. Industrial PLCs are quite expensive devices. In this study, design and implementation of a low-cost PLC using PIC18F4580 microcontroller are realized. Special software including a graphical user-interface is developed for programming the PLC and transferring code data to the device. Both ladder diagram and word instructions can be used for programming the PLC. © 2018 IEEE.Öğe An efficient big data anonymization algorithm based on chaos and perturbation techniques(MDPI AG, 2018) Eyüpoğlu, Can; Aydın, Muhammed Ali; Zaim, Abdül Halim; Sertbaş, AhmetThe topic of big data has attracted increasing interest in recent years. The emergence of big data leads to new difficulties in terms of protection models used for data privacy, which is of necessity for sharing and processing data. Protecting individuals' sensitive information while maintaining the usability of the data set published is the most important challenge in privacy preserving. In this regard, data anonymization methods are utilized in order to protect data against identity disclosure and linking attacks. In this study, a novel data anonymization algorithm based on chaos and perturbation has been proposed for privacy and utility preserving in big data. The performance of the proposed algorithm is evaluated in terms of Kullback-Leibler divergence, probabilistic anonymity, classification accuracy, F-measure and execution time. The experimental results have shown that the proposed algorithm is efficient and performs better in terms of Kullback-Leibler divergence, classification accuracy and F-measure compared to most of the existing algorithms using the same data set. Resulting from applying chaos to perturb data, such successful algorithm is promising to be used in privacy preserving data mining and data publishing. © 2018 by the authors.Öğe An electronic control unit for thermoelectric cooling(Institute of Electrical and Electronics Engineers Inc., 2019) Şanver, Ufuk; Yavuz, Erdem; Eyüpoğlu, CanDue to their efficient operation in small volumes, Thermoelectric Coolers (TECs) have a wide usage in cooling applications, and are preferable wherever usage of compressor-based cooling systems is hard. In this study, a control unit for thermoelectric cooling modules has been designed and implemented based on a microcontroller. The designed system allows users to specify the threshold values for thermoelectric coolers to operate on. The microcontroller drives the TEC using a pulse width modulation (PWM) technique via a MOSFET as a switching component. Adopting a PWM-based control technique makes it possible to manage the speed and energy consumption of the TEC system. © 2019 IEEEÖğe Energy Efficiency in Backbone Networks(Elsevier Science Bv, 2015) Eyüpoğlu, Can; Aydın, Muhammed Ali; Şener, Sefer; Saridogan, Ercan; Staub, SThe topic of energy efficiency in backbone networks has recently gained an increasing interest and has become one of the important parts of networking research. The energy consumption of current electronic devices is increasing too fast with the continuous growth of the Internet traffic. In addition, Information and Communications Technologies (ICT) consume the worldwide energy ranging from 2% to 10% and the consumption of ICT will almost double by 2020. According to many studies, the Internet will use 50% of the world electricity in the near future. In this study, energy efficiency of backbone networks is examined. Besides, the techniques recently used for energy saving in backbone networks are analyzed. (C) 2015 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).Öğe An ensemble of neural networks for breast cancer diagnosis(Institute of Electrical and Electronics Engineers Inc., 2017) Yavuz, Erdem; Eyüpoğlu, Can; Şanver, Ufuk; Yazıcı, RıfatSince breast cancer is a common disease in society all over the world, early diagnosis is of vital importance in order to treat patients before it reaches an irreversible phase. Expert systems are being developed to make it easier to diagnose the disease. In this study, an ensemble of neural networks named radial basis function network (RBFN), generalized regression neural network (GRNN) and feed forward neural network (FFNN) is implemented to separate breast cancer data samples into benign/malignant classes. The utilities of these common methods and the proposed hybrid model which is a combination of these methods are explored and their performances are comparatively presented. The experimental results on Wisconsin Diagnostic Breast Cancer (WDBC) dataset have proven that the proposed method presents a promise for diagnosis of breast cancer. The proposed model can be used as a tool to assist medical specialists in making their decision on the disease. © 2017 IEEE.Öğe An epileptic seizure detection system based on cepstral analysis and generalized regression neural network(PWN-Polish Scientific Publishers, 2018) Yavuz, Erdem; Kasapbaşı, Mustafa Cem; Eyüpoğlu, Can; Yazıcı, RıfatThis study introduces a new and effective epileptic seizure detection system based on cepstral analysis utilizing generalized regression neural network for classifying electroencephalogram (EEG) recordings. The EEG recordings are obtained from an open database which has been widely studied with many different combinations of feature extraction and classification techniques. Cepstral analysis technique is mainly used for speech recognition, seismological problems, mechanical part tests, etc. Utility of cepstral analysis based features in EEG signal classification is explored in the paper. In the proposed study, mel frequency cepstral coefficients (MFCCs) are computed in the feature extraction stage and used in neural network based classification stage. MFCCs are calculated based on a frequency analysis depending on filter bank of approximately critical bandwidths. The experimental results have shown that the proposed method is superior to most of the previous studies using the same dataset in classification accuracy, sensitivity and specificity. This achieved success is the result of applying cepstral analysis technique to extract features. The system is promising to be used in real time seizure detection systems as the neural network adopted in the proposed method is inherently of non-iterative nature. © 2018 Nalecz Institute of Biocybernetics and Biomedical Engineering of the Polish Academy of SciencesÖğe The Evaluation with Statistical Analyses of the Effect of Different Storage Condition and Type of Gas on the Properties of Plasma Treated Cotton Fabrics(Elsevier Science Bv, 2015) Kılınç, Mehmet; Canbolat, Şeyda; Eyüpoğlu, Can; Kut, Dilek; Şener, Sefer; Saridogan, Ercan; Staub, SIn this study, cotton fabric was treated with oxygen, nitrogen and argon plasma application. The plasma application was carried out for 10 minutes at low frequency. Firstly, contact angle of plasma treated samples was measured at the end of plasma treatment. The results showed that the plasma treatment causes to increase the hydrophility of samples. Moreover, it was seen that the type of gas affects the hydrophilic properties of samples. After then the samples were left during 1 month with different conditions which were under normal condition and covered with aluminum foil. Finally, the contact angle of plasma treated samples was measured after 1 month in order to determine the durability effect of plasma treatment on properties of cotton fabric. After the contact angle measurements, the results were evaluated with statistical analyses in terms of the type of gas and storage conditions of plasma treated samples. The results demonstrated that the storage conditions and type of gas affect the hydrophilic properties of plasma treated cotton fabric after 1 month. (C) 2015 The Authors. Published by Elsevier Ltd.Öğe An image processing application to detect faulty bottle packaging(Institute of Electrical and Electronics Engineers Inc., 2017) Şanver, Ufuk; Yavuz, Erdem; Eyüpoğlu, CanUse of automation technologies has received significant attention in recent years and has become one of the crucial parts of industry. The inspection of outputs in a production process is of great importance for companies to produce faultless products. This is vital for companies to sustain credibility and reliability as well. In this study, it is aimed to detect faulty packaging of bottles. Mineral water is bottled in factories and packaged to produce six-bottle and twenty-bottle packs transported on a conveyor belt. Faulty packaged products are rarely observed in this production process. However, it is not acceptable for these faulty products to leave the production line. In this work, an image processing application is implemented to detect and label faulty bottle packages for impeccable production. Sobel filter is utilized for edge detection and Hough transform is used for calculation of number of bottles in packages. The ones labelled as faulty packages are eliminated from conveyor belt by means of a boxer motor. © 2017 IEEE.Öğe Implementation of color face recognition using PCA and k-NN classifier(Institute of Electrical and Electronics Engineers Inc., 2016) Eyüpoğlu, CanThe topic of color face recognition has received significant attention in recent years and has become one of the important parts of image analysis and pattern recognition research. Furthermore, it is used in various applications related to person identification, video surveillance, access control, smart card, passport, information and social security, etc. In this study, k-Nearest Neighbors (k-NN) is used in order to classify color face images. Firstly, the classification is performed using only k-NN classifier. After that Principal Component Analysis (PCA) and k-NN classifier are used together. In addition, these two methods are implemented for different color space models and k values. Finally, the experiment results are compared with each other. © 2016 IEEE.Öğe Improvement of thermal insulation properties of polyester nonwoven and estimation of thermal conductivity coefficients using artificial neural network(ASTM International, 2019) Eyüpoğlu, Can; Eyüpoğlu, Şeyda; Merdan, NigarIn this study, polyester, i.e., Poly(ethylene terephthalate) (PET) nonwoven fabric, was coated with white tuff, perlite, and volcanic stone powder at rates of 10, 20, 30 and 40 % so as to increase the thermal insulation properties of PET nonwoven fabric. In order to apply white tuff, perlite, and volcanic stone powder to PET nonwoven fabric, polyurethane-based coating material was used as a cross-linking agent. The porosity and thermal conductivity coefficients of samples were then investigated as regards the type and concentration of stone powder. Furthermore, three-layer feed-forward artificial neural network (3FFNN) was used to estimate and verify the accuracy of the thermal conductivity coefficient of PET nonwovens coated with white tuff, perlite, and volcanic stone powder. The results showed that perlite stone powder provided higher thermal insulation compared to white tuff and volcanic stone powder. Moreover, thermal insulation coefficient of samples increased with the rise in concentration of white tuff, perlite, and volcanic stone powder. Besides, the accuracy of 3FFNN was 99 %. Artificial neural network (ANN)-based results showed that the thermal conductivity coefficients of samples with four different concentrations obtained from white tuff, perlite, and volcanic stone powder were almost the same for experimental and ANN-trained models. According to the results, it was seen that 3FFNN was correctly modeled, and the prediction of the thermal conductivity coefficients was successfully realized. Copyright © 2019 by ASTM International,Öğe Investigation of the bee-repellent properties of cotton fabrics treated with microencapsulated essential oils(SAGE Publications Ltd, 2019) Eyüpoğlu, Şeyda; Kut, Dilek; Girişgin, Ahmet Ongun; Eyüpoğlu, Can; Özüiçli, Mehmet; Dayıoğlu, Habip; Aydın, LeventIn this study, to produce single-use bee-repellent fabrics, a variety of essential oils were encapsulated with gum arabic wall material at a 1:5 ratio of wall to the core substance. The following core substances were used: lavender oil, laurel oil, fennel oil, N, N-diethyl-3-methylbenzamide (DEET), lavender + laurel oil, lavender + fennel oil, laurel + fennel oil, lavender + fennel + laurel oil, lavender oil + DEET, fennel oil + DEET and laurel oil + DEET. Lavender, fennel and laurel oils were analyzed by high-performance liquid chromatography. In this context, 11 different microcapsules were produced. After the microencapsulation process, the microcapsules were analyzed with a light microscope and by Fourier transform infrared spectroscopy. Furthermore, an image processing application was developed and implemented to determine the particle size distribution of the microcapsules. After the analysis of the microcapsules, cotton fabric samples were treated with the microcapsules. In order to analyze the microcapsules on the fabric samples, scanning electron microscopy (SEM) was used. To analyze the bee-repellent abilities of the fabric samples, 12 different measurement cabinets made of pine tree and glass were produced. According to the results, lavender and fennel oils can be used as bee-repellent alternatives to DEET in beekeeping. © The Author(s) 2018.Öğe Investigation of the effect of enzymatic and alkali treatments on the physico-chemical properties of Sambucus ebulus l. plant fiber(Elsevier, 2024) Eyüpoğlu, Şeyda; Eyüpoğlu, Can; Merdan, Nigarhe investigation aims to determine the effect of enzymatic and alkali treatments on Sambucus ebulus L. stem fiber. For this purpose, Sambucus ebulus L. stem fibers were treated with alkali, cellulase, and pectinase enzymes. An image processing technique was developed and implemented to calculate the average thicknesses of Sambucus ebulus L. fibers. The thickness of alkali, cellulase and pectinase enzyme treated fibers was determined as 478.62??m, 808.28??m and 478.20??m, respectively. Scanning electron microscopy analysis illustrated that enzymatic and alkali treatments lead to the breakage of fiber structure. Furthermore, enzymatic and alkali treatments induce variations in elemental ingredients. All treatments increased the crystallinity index of Sambucus ebulus L. fiber from 72?% (raw fiber) to 83?% (alkali treated), 75.2?% (cellulase enzyme treated) and 86.3?% (pectinase enzyme treated) due to the hydrolysis of hemicellulose. Fourier transform infrared analysis indicated that there are no significant differences in functional groups. Thermogravimetric analysis shows that enzymatic and alkali treatments improve final degradation temperature of the fiber. Mechanical behaviors of cellulase enzyme-treated fiber decrease compared to raw fiber, while pectinase enzyme and alkali treatment cause to improve mechanical properties. Tensile strength of samples was determined as 76.4?MPa (cellulase enzyme treated fiber), 210?MPa (pectinase enzyme treated fiber) and 240?MPa (alkali treated fiber). Young's modules of cellulase enzyme, pectinase enzyme and alkali treated fibers were predicted as 5.5?GPa, 13.1?GPa and 16.6?GPa. Elongation at break of samples was calculated as 5.5?% (cellulase enzyme treated fiber), 6.5?% (pectinase enzyme treated fiber) and 6?% (alkali treated fiber). The results suggest that enzymatic and alkali treatments can modify the functional and structural attributes of Sambucus ebulus L. fiber.Öğe Investigation of the Performance of Nikhilam Multiplication Algorithm(Elsevier Science Bv, 2015) Eyüpoğlu, Can; Şener, Sefer; Saridogan, Ercan; Staub, SMultiplication is one of the most important operations in computer arithmetic. Multiplication is used in many operations such as squaring, division and computing reciprocal. Moreover, multiplication is a very significant arithmetic operation for lots of signal processing applications which are convolution, correlation, frequency analysis, image processing etc. The efficiency of multiplication operation is crucial for the process time of these applications. Nikhilam algorithm is one of the algorithms developed for increasing the efficiency and reducing the cost in order to simplify multiplication. In this work, the performance of Nikhilam multiplication algorithm is analyzed in terms of the number of multiplication and the total process time for different bit lengths. (C) 2015 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).Öğe Karatsuba ve nikhilam çarpma işlemi algoritmalarının farklı bit uzunlukları için performanslarının karşılaştırılması(İstanbul Ticaret Üniversitesi, 2015) Eyüpoğlu, Can; Sertbaş, AhmetÇarpma işlemi bilgisayar aritmetiğindeki en önemli işlemlerden biridir. Bölme, kare ve ters alma gibi birçok işlemde çarpma işlemi kullanılmaktadır. Ayrıca çarpma işleminin etkinliği korelasyon, filtreleme, frekans analizi ve görüntü işleme gibi dijital sinyal işleme uygulamalarında da kullanılması sebebiyle oldukça önem kazanmaktadır. Karatsuba ve Nikhilam algoritmaları çarpma işlemini basitleştirerek işlemin verimliliğini arttırmak ve maliyeti azaltmak için geliştirilen algoritmalardan ikisidir. Bu makalede, Karatsuba algoritması, Nikhilam algoritması ve Nikhilam kare alma algoritmasını kullanarak Nikhilam çarpma işlemini gerçekleştiren algoritmanın performansları farklı bit uzunlukları için çarpma işlemi sayıları ve toplam işlem süreleri açısından karşılaştırmalı olarak analiz edilmiştir.Öğe Performance Analysis of Karatsuba Multiplication Algorithm for Different Bit Lengths(Elsevier Science Bv, 2015) Eyüpoğlu, Can; Şener, Sefer; Saridogan, Ercan; Staub, SIn computer arithmetic, multiplication is one of the most significant operations. Multiplication is used in many operations such as division, squaring and computing reciprocal. In addition, the efficiency of multiplication is crucial due to the use of digital signal processing applications such as correlation, filtering, frequency analysis and image processing. Karatsuba algorithm is one of the algorithms developed for increasing the efficiency and reducing the cost in order to simplify multiplication. In this study, the performance of Karatsuba algorithm is analyzed in terms of the number of multiplication and the total process time for different bit lengths. (C) 2015 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).