Использование ущербных кодов в крипто-кодовых системах
Дата
2017
Автори
DOI
Науковий ступінь
Рівень дисертації
Шифр та назва спеціальності
Рада захисту
Установа захисту
Науковий керівник
Члени комітету
Назва журналу
Номер ISSN
Назва тому
Видавець
Харківський університет Повітряних Сил ім. Івана Кожедуба
Анотація
Рассматриваются общая конструкция несимметричных крипто-кодовых систем (НККС) на основе теоретико-кодовой схемы (ТКС) Мак-Элиса на алгеброгеометрических (АГК) на эллиптических кривых (эллиптических кодах, ЕС), позволяющих интегрировано (одним механизмом) обеспечивать требуемый уровень безопасности на основе теоретико-сложностной задачи – декодирования случайного кода (обеспечивается 1030–1035 групповых операций, при мощности поля GF(210), оперативности – на уровне быстро-действия криптопреобразований блочно-симметричных шифров (БСШ), достоверности – на основе алгеброгеометрических (помехоустойчивых m-чных кодов) обеспечить Pош 10–9–10–12. Анализируются способы построения ущербных кодов, многоканальные протоколы обеспечения безопасности на основе НККС на ущербных кодах. Использование ущербных кодов позволяет увеличить быстродействие кодовых преобразований в НККС за счет уменьшения мощности поля GF (24–26), обеспечив требуемый уровень криптостойкости на основе увеличения полной энтропии ущербных кодов (увеличения расстояния единственности ключевых данных). Полученные результаты позволяют строить гибридные (комплексные) криптосистемы, обеспечивая основные показатели безопасности, оперативности и достоверности, предъявляемые к современным коммуникационным системам и сетям.
The article proves the urgency of studies on the construction of hybrid (complex) cryptosystems based on systems on defec-tive codes and crypto-code structures, with considering the requirements for technical security facilities in open communication systems and networks (CSN). The development of computer systems in the era of high technology extends the functional range of their application in various areas of open corporate and global systems. However, their development contributes to the moderni-zation of old and the emergence of new attacks, the development of cyber-attacks on the management systems of corporate and global systems. This puts forward new requirements to the basic information security requirements for the circulating CSN, without reducing the basic reliability (authenticity) and efficiency (throughput) parameters affecting the quality of service for subscribers of open corporate and global networks. To ensure the evitable quality of service requirements, the work analyzes the fundamentals of building crypto-code systems based on the modified McElis and Niederreiter theoretic-code schemes on modi-fied algebra-geometric codes (elliptic codes, EC), which allow one to provide (with integrated) the required reliability and effi-ciency indicators Crypto-transformations (1030 - 1035 group operations are provided with stability, with field strength GF (210), efficiency - at the level of performance, crypto formations block-symmetric ciphers (BSC) reliability – based on Algebraic (m-ary error-correcting codes) provide Posh 10-9 – 10-12). A significant drawback in the practical implementation of these cryptosystems is the significant energy costs due to the need to build on GF (210). An analysis of the theoretical foundations of the use of multi-channel systems on defective codes is carried out. The results obtained make it possible to construct hybrid (complex) cryptosys-tems based on McElis modified non-symmetric crypto-coded systems (MCCS) using defective codes, the main difference from the known approaches for constructing hybrid cryptosystems is the use of MCCS instead of symmetric cryptosystems with the further use of systems on defective codes. For the first time, the approach proposed in the work of the formation of hybrid cryptosystems based on the MCCS on the defective codes makes it possible to reduce the energy costs in their practical implementation on the basis of a reduction in power, the alphabet used.
The article proves the urgency of studies on the construction of hybrid (complex) cryptosystems based on systems on defec-tive codes and crypto-code structures, with considering the requirements for technical security facilities in open communication systems and networks (CSN). The development of computer systems in the era of high technology extends the functional range of their application in various areas of open corporate and global systems. However, their development contributes to the moderni-zation of old and the emergence of new attacks, the development of cyber-attacks on the management systems of corporate and global systems. This puts forward new requirements to the basic information security requirements for the circulating CSN, without reducing the basic reliability (authenticity) and efficiency (throughput) parameters affecting the quality of service for subscribers of open corporate and global networks. To ensure the evitable quality of service requirements, the work analyzes the fundamentals of building crypto-code systems based on the modified McElis and Niederreiter theoretic-code schemes on modi-fied algebra-geometric codes (elliptic codes, EC), which allow one to provide (with integrated) the required reliability and effi-ciency indicators Crypto-transformations (1030 - 1035 group operations are provided with stability, with field strength GF (210), efficiency - at the level of performance, crypto formations block-symmetric ciphers (BSC) reliability – based on Algebraic (m-ary error-correcting codes) provide Posh 10-9 – 10-12). A significant drawback in the practical implementation of these cryptosystems is the significant energy costs due to the need to build on GF (210). An analysis of the theoretical foundations of the use of multi-channel systems on defective codes is carried out. The results obtained make it possible to construct hybrid (complex) cryptosys-tems based on McElis modified non-symmetric crypto-coded systems (MCCS) using defective codes, the main difference from the known approaches for constructing hybrid cryptosystems is the use of MCCS instead of symmetric cryptosystems with the further use of systems on defective codes. For the first time, the approach proposed in the work of the formation of hybrid cryptosystems based on the MCCS on the defective codes makes it possible to reduce the energy costs in their practical implementation on the basis of a reduction in power, the alphabet used.
Опис
Ключові слова
несимметричная крипто-кодовая система, теоретико-кодовая схема, помехоустойчивые алгеброгеометрические коды, ущербные коды, asymmetric crypto-code system, code-theoretic scheme, noise-resistant algebraic geometry codes, defective codes
Бібліографічний опис
Евсеев С. П. Использование ущербных кодов в крипто-кодовых системах / С. П. Евсеев // Системи обробки інформації. – 2017. – Вип. 5 (151). – С. 109-121.