Development of Niederreiter hybrid crypto-code structure on flawed codes

dc.contributor.authorYevseiev, S. P.en
dc.contributor.authorTsyhanenko, O. S.en
dc.contributor.authorGavrilova, A.en
dc.contributor.authorGuzhva, V.en
dc.contributor.authorMilov, O.en
dc.contributor.authorMoskalenko, V.en
dc.contributor.authorOpirskyy, I.en
dc.contributor.authorRoma, O.en
dc.contributor.authorTomashevsky, B.en
dc.contributor.authorShmatko, O.en
dc.date.accessioned2021-12-02T11:25:18Z
dc.date.available2021-12-02T11:25:18Z
dc.date.issued2019
dc.description.abstractThe use of the Niederreiter modified crypto-code structure (MCCS) with additional initialization vectors (with many invalid positional vectors of the error vector and multiple positions of shortening the error vector) requires an increase in the speed of cryptographic transformation of the system as a whole. For this purpose, it is proposed to use flawed codes. Flawed codes allow you to increase the speed of code transformations by reducing the power of the field while damaging the plaintext and reducing the amount of data transferred by damaging the ciphertext. This approach allows the construction of hybrid crypto-code structures based on the synthesis of Niederreiter modified crypto-code structures on modified (shortened or extended) codes on elliptic curves with damaging procedures. A significant difference from classical hybrid (complex) cryptosystems is the use of asymmetric cryptosystems to ensure data security with fast crypto-transformation procedures (generation and decoding of a codogram). The paper discusses methods for constructing flawed codes and approaches for using the Niederreiter hybrid crypto-code structure on modified elliptic codes. Practical algorithms are proposed for using the MV2 damage mechanism in the Niederreiter crypto-code structure on modified elliptic codes, which makes it possible to implement a hybrid crypto-code structure. The results of a comparative assessment of energy consumption for the formation of an information package with various methods of damage, which determined the choice of damage method in practical algorithms. The conducted studies confirm the competitive efficiency of the proposed cryptosystem in Internet technologies and mobile networks, ensuring practical implementation on modern platforms and the necessary cryptographic strength under post-quantum cryptography.en
dc.identifier.citationDevelopment of Niederreiter hybrid crypto-code structure on flawed codes / S. Yevseiev [et al.] // Eastern-European Journal of Enterprise Technologies. – 2019. – Vol. 1, No. 9 (97). – P. 27-38.en
dc.identifier.doidoi.org/10.15587/1729-4061.2019.156620
dc.identifier.orcidhttps://orcid.org/0000-0003-1647-6444
dc.identifier.orcidhttps://orcid.org/0000-0002-5784-8438
dc.identifier.orcidhttps://orcid.org/0000-0002-2015-8927
dc.identifier.orcidhttps://orcid.org/0000-0001-6832-4480
dc.identifier.orcidhttps://orcid.org/0000-0001-6135-2120
dc.identifier.urihttps://repository.kpi.kharkov.ua/handle/KhPI-Press/55120
dc.language.isoen
dc.publisherPC Technology centeren
dc.publisherUkrainian State University of Railway Transporten
dc.subjectflawed codesen
dc.subjectNiederreiter hybrid crypto-code structureen
dc.subjectmodified elliptic codesen
dc.subjectmultichannel cryptographyen
dc.titleDevelopment of Niederreiter hybrid crypto-code structure on flawed codesen
dc.typeArticleen

Файли

Контейнер файлів
Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
EEJET_2019_1_9_Yevseiev_Development.pdf
Розмір:
531.42 KB
Формат:
Adobe Portable Document Format
Опис:
Ліцензійна угода
Зараз показуємо 1 - 1 з 1
Ескіз недоступний
Назва:
license.txt
Розмір:
11.25 KB
Формат:
Item-specific license agreed upon to submission
Опис: