Practical implementation of the Niederreiter modified crypto­code system on truncated elliptic codes

Abstract

On the basis of the practical implementation of the classic Niederreiter scheme for non-binary codes, a pattern has been identified for practical implementation –fixing the admissible position vectors of the plaintext transformation based on equilibrium coding. The obtained set of position vectors of the error vector with a fixed set of masking matrices (the recipient's private key) allows us to obtain the algorithm for decoding the classical Niederreiter crypto-code scheme on non-binary codes. For this, a modification of the crypto-code system (CCS) is necessary. It is proposed to use the additional parameter of key data – the initialization vector (the set of invalid position vectors of the error vector). To counter the Sidelnikov attacks, it is proposed to use modified (shortened) algebraic-geometric (elliptic) codes (MEC). For this, it is necessary to use the second additional initialization vector (the set of positions for shortening the error vector). Based on the modification of the classical Niederreiter scheme on non-binary codes, applied algorithms for generating and decrypting a cryptogram in the Niederreiter modified crypto-code system based on modified (shortened) elliptic codes and software are proposed. To confirm the profitability of the proposed crypto-code system, the results of the comparative evaluation of energy consumption for the implementation of the classical Niederreiter scheme on elliptic codes and the implementation of the proposed system on modified elliptic codes are presented. The results confirm the possibility of practical implementation of the Niederreiter crypto-code system based on the proposed algorithms. At the same time, the required level of cryptographic strength of the crypto-code system, protection of the cryptosystem against the Sidelnikov attacks and an increase in the rate of cryptographic transformations by 3-5 times compared with the classical Niederreiter scheme are guaranteed

Authors and Affiliations

Serhii Yevseiev, Oleksii Tsyhanenko, Volodymyr Aleksiyev, Dmytrо Verheles, Sergey Volkov, Roman Korolev, Hryhorii Kots, Oleksandr Milov, Olexander Shmatko

Keywords

Related Articles

Development of Niederreiter hybrid crypto-code structure on flawed codes

<p>The use of the Niederreiter modified crypto-code structure (MCCS) with additional initialization vectors (with many invalid positional vectors of the error vector and multiple positions of shortening the error vector)...

Estimation of the effect of temperature, the concentration of oxygen and catalysts on the oxidation of the thermoanthracite carbon material

<p>The effect of temperature, oxygen concentration and gas-air mixture flow rate on the oxidation efficiency of thermoanthracite carbon granular material with the formation of carbon monoxide and dioxide is considered. T...

Research into the process of multi-level management of enterprise production activities with taking risks into consideration

<p>The study considers the process of management of the production activity of an enterprise during a certain interval of time. It takes into account components of the production process and an influence of various produ...

Development of methodical provisions regarding the substantiation of the combat structure of forces for activities in the airspace

<p>The determining factor for success during modern warfare is the struggle for supremacy in the air. The main task for a defending side is to prevent the enemy's superiority in the air. Various means of destruction are...

Development of the analytical method of the general mathieu equation solution

<p>An analytical method for solving the general Mathieu differential equation in the initial form is proposed. The method is based on the corresponding exact solution, which is found for arbitrary numerical parameters of...

Download PDF file
  • EP ID EP528267
  • DOI 10.15587/1729-4061.2018.150903
  • Views 71
  • Downloads 0

How To Cite

Serhii Yevseiev, Oleksii Tsyhanenko, Volodymyr Aleksiyev, Dmytrо Verheles, Sergey Volkov, Roman Korolev, Hryhorii Kots, Oleksandr Milov, Olexander Shmatko (2018). Practical implementation of the Niederreiter modified crypto­code system on truncated elliptic codes. Восточно-Европейский журнал передовых технологий, 6(4), 24-31. https://europub.co.uk/articles/-A-528267