Research of crypto-code designs construction for using in post quantum cryptography
-
DOIhttp://dx.doi.org/10.21511/dm.4(4).2018.03
-
Article InfoVolume 16 2018, Issue #4, pp. 26-39
- Cited by
- 908 Views
-
128 Downloads
This work is licensed under a
Creative Commons Attribution 4.0 International License
The article analyzes construction of crypto-code designs (CCDs) on the basis of asymmetric Mac-Alice and Niederreiter crypto-code systems on elliptical (EC) and modified elliptic codes (MEC), which, in the conditions of post-quantum cryptography, allow to provide a guaranteed level of crypto stability, to counteract the modern Attacks and attack by V. Sidelnikov on the theoretical code schemes of McAlias and Niederreiter. Schemes of hybrid crypto-code designs constraction the lossy codes are addressed. Methods of constructing mechanisms of confidentiality and integrity of banking information resources under hybrid threats to security components (information security, cybersecurity, information security) are proposed. Using of a lossy code is suggested to this end. Lossy Code allow you to increase the speed of code changes by reducing the power of the field when causing damage to open text and reducing the amount of data transferred by causing harm to the cipher text. The methods of constructing unprofitable codes and approaches for use in hybrid KKK of McAlias and Niederreiter on modified elliptic codes are considered. Practical algorithms for the use of the MV2 mechanism in McAlias’ CCD and Niederreiter’s modified elliptic codes are proposed, which allows the implementation of the CCD hybrid scheme. The comparative results of the study of stability and power capacity with respect to their practical use in automated banking systems are presented.
- Keywords
-
JEL Classification (Paper profile tab)Н56
-
References29
-
Tables4
-
Figures8
-
- Figure 1. Classification of cryptosystems based on CCS
- Figure. 2. The block diagram of one step of the universal mechanism of causing damage
- Figure 3. The main ways of causing damage
- Figure. 4. Basic protocols for providing security services
- Figure. 5. Structural diagram of construction of a hybrid crypto-code system on the basis of causing damage to open text
- Figure. 6. The block diagram of construction of a hybrid cryptosystem on the basis of damage to ciphertext
- Figure 7. The protocol of exchange with the help of the McEliece’s HCCS on shortened MES
- Figure 8. Protocol for the exchange with McEliece’s HCCS on extended MES
-
- Table 1. The results of studies on the dependence of the length of the input sequence on the MV2 algorithm from the number of processor counts
- Table 2. Results of research of time and speed indicators of procedures of drawing and removal of damage
- Table 3. The dependence of the software implementation speed on the power of the field (number of group operations)
- Table 4. Results of research on statistical safety
-
- Androshchuk, G. O. (2017). Cybersecurity: Trends in the World and Ukraine. (pp. 30-36). Cyber security and intellectual property: problems of legal provision. Kyiv: Vyd-vo “Politekhnika”.
- Babych, E. U. (2016). Забезпечення кібербезпеки в Україні [Zabezpechennya kiberbezpeky v Ukrayini] (рр. 77-78). Aktualni zadachi ta dosyahnennya u haluzi kiberbezpeky. Kropivnitsky: KNTU.
- Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., & Schipani, D. (2016). Enhanced public key security for the McEliece cryptosystem. Journal of Cryptology, 29(1), 1-27.
- Baranov, O. A. (2014). Про тлумачення та визначення поняття «кібербезпека» [Pro tlumachennya ta vyznachennya ponyattya «kiberbezpeka»]. Pravova informatyka, 2, 54-62.
- Bassham, L. E., Rukhin, A. L., Soto, J., Nechvatal, J. R., Smid, M. E., Leigh, S. D., Levenson, M., Vangel, M., & Heckert, N. A. (2010). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Special Publication (NIST SP).
- Chen, L., Jordan, S., Liu, Y-K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016). Report on Post-Quantum Cryptography.
- Cho, J. Y., Griesser, H., & Rafique, D. (2017). A McEliece-based key exchange protocol for optical communication systems. Proceedings of the 2nd Workshop on Communication Security. (pp. 109-123).
- De Vries, S. (2016). Achieving 128-bit security against Quantum Attacks in OpenVPN. (Master Thesis). University of Twente.
- Dinh, H., Moore, C., & Russell, A. (2011). McEliece and niederreiter cryptosystems that resist quantum fourier sampling attacks. Proceeding Crypto 11 Proceedings of the 31st annual conference on advances in cryptology. (pp. 761-779).
- Dudikevich, V. B., Kuznetsov, O. O., & Tomashevsky, B. P. (2010). Крипто-кодовий захист інформації з недвійковим рівно ваговим кодуванням [Krypto-kodovyy zakhyst informatsiyi z nedviykovym rivnovahovym koduvannyam]. Suchasnyi zakhyst informatsii, 2, 14-23.
- Dudikevich, V. B., Kuznetsov, O. O., & Tomashevsky, B. P. (2010). Метод недвійкового рівновагового кодування [Metod nedviykovoho rivnovahovoho koduvannya]. Suchasnyi zakhyst informatsii, 3, 57-68.
- Evseev, S., Rzaev, H., Korol, O., & Imanova, Z. (2016). Разработка модифицированной несимметричной крипто-кодовой системы мак-элиса на укороченных эллиптических кодах [Razrabotka modifitsirovannoy nesimmetrichnoy kripto-kodovoy sistemy Mak-Elisa na ukorochennykh ellipticheskikh kodakh]. Eastern-European Journal of Enterprise Technologies, 4/9(82), 18-26.
- Grischuk, R. V., & Danik, Y. G. (2016). Основи кібербезпеки [Osnovy kiberbezpeky] (636 p.). Zhitomir: ZhNAEU.
- Hryshchuk, R. & Molodetska-Hrynhchuk, K. (2018). Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War. Information & Security: An International Journal, 41, 55-73.
- Hryshchuk, R., & Molodetska, К. (2016). Synergetic Control of Social Networking Services Actors’ Interactions. Recent Advances in Systems, Control and Information Technology, 543, 34-42.
- Kuchuk, G., Kharchenko, V., Kovalenko, A., & Ruchkov, E. (2016). Approaches to Selection of Combinatorial Algorithm for Optimization in Network Traffic Control of Safety-Critical Systems. IEEE East-West Design & Test Symposium (EWDTS), 384-389.
- Kuchuk, N., Mozhaiev, O., Mozhaiev, M., & Kuchuk, H. (2017). Method for calculating of R-learning traffic peakedness. 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T). (pp. 359-362).
- Leonenko, G. P., & Yudin, A. Y. (2013). Проблемы обеспечения информационной безопасности систем критически важной информационной инфраструктуры Украины [Problemy obespecheniya informatsionnoy bezopasnosti sistem kriticheski vazhnoy informatsionnoy infrastruktury Ukrainy]. Information Technology and Security, 1(3), 44-48.
- Mishchenko, V. A., & Vilansky, Yu. V. (2007). Damage texts and multichannel cryptography. (292 p.). Minsk: Encyclopedic.
- Mishchenko, V. A., Vilansky, Yu. V., & Lepin V. V. (2006). The cryptographic algorithm MV 2. Minsk.
- Morozov, K., Roy, P. S., & Sakurai, K. (2017). On unconditionally binding code-based commitment schemes. Proceeding IMCOM 17 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication. USA: NY, New York.
- Mozhaev, O., Kuchuk, H., Kuchuk, N., Mykhailo, M., & Lohvynenko, M. (2017). Multiservice network security metric. 2nd International Conference on Advanced Information and Communication Technologies (AICT). (рр. 133-136).
- Niederreiter, H. (1986). Knapsack type cryptosystems and algebraic coding theory. Probl. Control and Inform. Theory, 15, 19-34.
- Sidelnikov, V. M., (2008). Теория кодирования [Teoriya kodirovaniya] (324 p). M.: Fyzmatlyt.
- Yevseiev, S. (2017). The Use of Damage Codes in Crypto-Code Systems. Information Processing Systems, 5(151), 109-121.
- Yevseiev, S., & Korol, O. (2018). Theoretical and methodological principles of construction of hybrid crypto-code structures on the loss codes. Information economy: stages of development, management methods, models. Kharkiv: VSEM, KhNEU.
- Yevseiev, S., & Tsyhanenko, O. (2018). Розробка несиметричної крипто-кодової конструкції Нідеррайтера на модифікованих еліптичних кодах [Rozrobka nesimetrichnoї kripto-kodovoї konstrukcії Nіderrajtera na modifіkovanih elіptichnih kodah]. Information Processing Systems, 2(153), 127-135.
- Yevseiev, S., Kots, H., & Liekariev, Y. (2016). Developing of multi-factor authentication method based on Niederreiter-McEliece modified crypto-code system. Eastern-European Journal of Enterprise Technologies, 6/4(84), 11-23.
- Yevseiev, S., Kots, H., Minukhin, S., Korol, O., & Kholodkova, A. (2017). The development of the method of multifactor authentication based on hybrid crypto-code constructions on defective codes. Eastern-European Journal of Enterprise Technologies, 5/9(89), 19-35.