Development of Niederreiter hybrid crypto-code structure on flawed codes

Abstract

<p>The use of the Niederreiter modified crypto-code structure (MCCS) with additional initialization vectors (with many invalid positional vectors of the error vector and multiple positions of shortening the error vector) requires an increase in the speed of cryptographic transformation of the system as a whole. For this purpose, it is proposed to use flawed codes. Flawed codes allow you to increase the speed of code transformations by reducing the power of the field while damaging the plaintext and reducing the amount of data transferred by damaging the ciphertext. This approach allows the construction of hybrid crypto-code structures based on the synthesis of Niederreiter modified crypto-code structures on modified (shortened or extended) codes on elliptic curves with damaging procedures. A significant difference from classical hybrid (complex) cryptosystems is the use of asymmetric cryptosystems to ensure data security with fast crypto-transformation procedures (generation and decoding of a codogram). The paper discusses methods for constructing flawed codes and approaches for using the Niederreiter hybrid crypto-code structure on modified elliptic codes. Practical algorithms are proposed for using the MV2 damage mechanism in the Niederreiter crypto-code structure on modified elliptic codes, which makes it possible to implement a hybrid crypto-code structure. The results of a comparative assessment of energy consumption for the formation of an information package with various methods of damage, which determined the choice of damage method in practical algorithms. The conducted studies confirm the competitive efficiency of the proposed cryptosystem in Internet technologies and mobile networks, ensuring practical implementation on modern platforms and the necessary cryptographic strength under post-quantum cryptography</p>

Authors and Affiliations

Serhii Yevseiev, Oleksii Tsyhanenko, Alla Gavrilova, Viktor Guzhva, Oleksandr Milov, Valentina Moskalenko, Ivan Opirskyy, Bogdan Tomashevsky, Olexander Shmatko

Keywords

Related Articles

Using the elements from a fuzzy sets theory in the process of diagnosing the loyalty of consumers of motor transport services

<p>We developed an approach to diagnosing the complex loyalty of consumer of motor transport services based on the perceptual and behavioral characteristics with application of the theory of fuzzy sets. Diagnosing the le...

Development of a miniature microwave radiothermograph for monitoring the internal brain temperature

<p>To improve efficiency of non-invasive monitoring of the internal brain temperature, a small-size single-channel microwave radiothermograph consisting of a miniature radiometer and a radiometric sensor based on a print...

Development of the method to operatively control quality of iron ore raw materials at open and underground extraction

<p>The main task of the mining industry is to improve the efficiency of extraction and processing of iron ore. One of the main factors contributing to solving the task is determining the content of iron in the ore body a...

Determining electrical losses of the traction drive of electric train based on a synchronous motor with excitation from permanent magnets

<p>We have studied a traction drive based on the synchronous motor with excitation from permanent magnets for its electrical losses. A simulation model of the traction drive is synthesized, which employs the algorithm of...

Development of a method of increasing the interference immunity of frequency-hopping spread spectrum radio communication devices

The development of a technique for increasing the interference immunity of frequency-hopping spread spectrum radio communication equipment has been carried out. The essence of the proposed method is the rational distribu...

Download PDF file
  • EP ID EP666225
  • DOI 10.15587/1729-4061.2019.156620
  • Views 75
  • Downloads 0

How To Cite

Serhii Yevseiev, Oleksii Tsyhanenko, Alla Gavrilova, Viktor Guzhva, Oleksandr Milov, Valentina Moskalenko, Ivan Opirskyy, Bogdan Tomashevsky, Olexander Shmatko (2019). Development of Niederreiter hybrid crypto-code structure on flawed codes. Восточно-Европейский журнал передовых технологий, 1(9), 27-38. https://europub.co.uk/articles/-A-666225