Practical implementation of the Niederreiter modified crypto­code system on truncated elliptic codes

Abstract

On the basis of the practical implementation of the classic Niederreiter scheme for non-binary codes, a pattern has been identified for practical implementation –fixing the admissible position vectors of the plaintext transformation based on equilibrium coding. The obtained set of position vectors of the error vector with a fixed set of masking matrices (the recipient's private key) allows us to obtain the algorithm for decoding the classical Niederreiter crypto-code scheme on non-binary codes. For this, a modification of the crypto-code system (CCS) is necessary. It is proposed to use the additional parameter of key data – the initialization vector (the set of invalid position vectors of the error vector). To counter the Sidelnikov attacks, it is proposed to use modified (shortened) algebraic-geometric (elliptic) codes (MEC). For this, it is necessary to use the second additional initialization vector (the set of positions for shortening the error vector). Based on the modification of the classical Niederreiter scheme on non-binary codes, applied algorithms for generating and decrypting a cryptogram in the Niederreiter modified crypto-code system based on modified (shortened) elliptic codes and software are proposed. To confirm the profitability of the proposed crypto-code system, the results of the comparative evaluation of energy consumption for the implementation of the classical Niederreiter scheme on elliptic codes and the implementation of the proposed system on modified elliptic codes are presented. The results confirm the possibility of practical implementation of the Niederreiter crypto-code system based on the proposed algorithms. At the same time, the required level of cryptographic strength of the crypto-code system, protection of the cryptosystem against the Sidelnikov attacks and an increase in the rate of cryptographic transformations by 3-5 times compared with the classical Niederreiter scheme are guaranteed

Authors and Affiliations

Serhii Yevseiev, Oleksii Tsyhanenko, Volodymyr Aleksiyev, Dmytrо Verheles, Sergey Volkov, Roman Korolev, Hryhorii Kots, Oleksandr Milov, Olexander Shmatko

Keywords

Related Articles

ESTIMATION OF FIRE PROTECTION EFFICIENCY OF ARTICLES MADE FROM REED UNDER AN EXTERNAL ACTION OF GASOLINE FLAME

Our study into the process of reed ignition has established the mechanisms of heat transfer to a material, which makes it possible to influence this process. It has been proven that the process of ignition implies heatin...

Prediction of the electrical resistance of multilayer carbon fiber composites

<p>The issues of calculation of electrical phenomena in multilayer carbon fiber composite materials are considered. The method for assessing the reliability of composite material models for modeling electrical phenomena...

A method for determining information diffusion cascades on social networks

Information diffusion on social networks has many potential real-world applications such as online marketing, e-government campaigns, and predicting large social events. Modeling information diffusion is therefore a cruc...

The role of fatty acid structure in various pure vegetable oils on flame characteristics and stability behavior for industrial furnace

<p>This study investigates the effects of the fatty acid composition of various vegetable oils on the behavior of flames in the combustion process. The research is important for the substitution of fossil fuel using envi...

Effect of the cryopowder "beet" on quality indicators of new curd desserts

<p>Natural plant bio-additives deserve special attention, because due to their natural properties they provide dairy products with functional properties. The use of such additives makes it possible to fill the shortage o...

Download PDF file
  • EP ID EP528267
  • DOI 10.15587/1729-4061.2018.150903
  • Views 65
  • Downloads 0

How To Cite

Serhii Yevseiev, Oleksii Tsyhanenko, Volodymyr Aleksiyev, Dmytrо Verheles, Sergey Volkov, Roman Korolev, Hryhorii Kots, Oleksandr Milov, Olexander Shmatko (2018). Practical implementation of the Niederreiter modified crypto­code system on truncated elliptic codes. Восточно-Европейский журнал передовых технологий, 6(4), 24-31. https://europub.co.uk/articles/-A-528267