Development of Niederreiter hybrid crypto-code structure on flawed codes

Abstract

<p>The use of the Niederreiter modified crypto-code structure (MCCS) with additional initialization vectors (with many invalid positional vectors of the error vector and multiple positions of shortening the error vector) requires an increase in the speed of cryptographic transformation of the system as a whole. For this purpose, it is proposed to use flawed codes. Flawed codes allow you to increase the speed of code transformations by reducing the power of the field while damaging the plaintext and reducing the amount of data transferred by damaging the ciphertext. This approach allows the construction of hybrid crypto-code structures based on the synthesis of Niederreiter modified crypto-code structures on modified (shortened or extended) codes on elliptic curves with damaging procedures. A significant difference from classical hybrid (complex) cryptosystems is the use of asymmetric cryptosystems to ensure data security with fast crypto-transformation procedures (generation and decoding of a codogram). The paper discusses methods for constructing flawed codes and approaches for using the Niederreiter hybrid crypto-code structure on modified elliptic codes. Practical algorithms are proposed for using the MV2 damage mechanism in the Niederreiter crypto-code structure on modified elliptic codes, which makes it possible to implement a hybrid crypto-code structure. The results of a comparative assessment of energy consumption for the formation of an information package with various methods of damage, which determined the choice of damage method in practical algorithms. The conducted studies confirm the competitive efficiency of the proposed cryptosystem in Internet technologies and mobile networks, ensuring practical implementation on modern platforms and the necessary cryptographic strength under post-quantum cryptography</p>

Authors and Affiliations

Serhii Yevseiev, Oleksii Tsyhanenko, Alla Gavrilova, Viktor Guzhva, Oleksandr Milov, Valentina Moskalenko, Ivan Opirskyy, Bogdan Tomashevsky, Olexander Shmatko

Keywords

Related Articles

Study of the oxidation kinetics of nitrite ions by potassium ferrate(VI)

<p>The oxidation kinetics of nitrite to nitrate ions by potassium ferrate(VI) in a wide range of pH, from neutral to alkaline medium has been studied. Two series of kinetic experiments based on the different technologies...

Acceleration analysis of the quadratic sieve method based on the online matrix solving

<p>The algorithm for the<strong> </strong>online matrix solving<strong> </strong>is proposed. The rate of acceleration of the basic quadratic sieve method based on the online matrix solving<strong> </strong>is investigat...

Development of algorithms for improving the accuracy and performance speed of a functional analog­to­digital converter

<p>This paper presents results of the study into the functional analog-to-digital conversion with a replaceable logarithm base. In known analog-to-digital converters, an increase in speed leads to a decrease in accuracy...

Development of the method of frequency­temporal representation of fluctuations of gaseous medium parameters at fire

<p>The method of operative frequency-temporal representation of fluctuations of gaseous media parameters at an early stage of fire at premises was developed. The basic assumptions about the peculiarities of dynamics of h...

Cylindrical harmonic analysis of the magnetic field in the aperture of the superconducting winding of an electromagnet

<p>It is of practical interest to create such models of the electromagnetic field of an electromagnet that help correct the mean integral coefficients of the harmonics of magnetic induction by the geometric parameters of...

Download PDF file
  • EP ID EP666225
  • DOI 10.15587/1729-4061.2019.156620
  • Views 87
  • Downloads 0

How To Cite

Serhii Yevseiev, Oleksii Tsyhanenko, Alla Gavrilova, Viktor Guzhva, Oleksandr Milov, Valentina Moskalenko, Ivan Opirskyy, Bogdan Tomashevsky, Olexander Shmatko (2019). Development of Niederreiter hybrid crypto-code structure on flawed codes. Восточно-Европейский журнал передовых технологий, 1(9), 27-38. https://europub.co.uk/articles/-A-666225