Possibilities for authentication of the interaction parties based on recurrent sequences

Authors

  • Юрій Євгенович Яремчук Вінницький національний технічний університет

DOI:

https://doi.org/10.18372/2410-7840.15.5509

Keywords:

information security, cryptography, authentication, recurrent sequence

Abstract

To date, for solving the integrity provision problem of broad utilization, we received protocols of authentication and digital signature. Amongst them, protocols of the par­ties to interaction hold an important place, when a checkup of the fact that the interacting party is the self-identified party, is conducted by one party. The existing authentica­tion methods are based mainly on operations of exponen­tiation, requiring implementation of complex calculations, affecting the speed of the method at the stage of its practi­cal implementation. We consider a possibility of creating an authentication method of the interaction parties based on the mathematical apparatus of recurrent sequences, based on the proportions in which the initial elements are associated with the coefficients. We have worked out a pro­tocol implementing the method. The proposed method, compared with the known analogues, allowed to increase the cryptographic reliability of the authentication process, and the ability to change the reliability of the method de­pending on the sequence order. The presented develop­ments made it possible to expand the use of authentication methods, especially in protection systems with high level of secrecy.

Author Biography

Юрій Євгенович Яремчук, Вінницький національний технічний університет

Ph.D., Director of IT and Information Security Center, Professor Department of Management and Security of Information Systems, Vinnytsia National Technical University.

References

Введение в криптографию [Текст] / под общ. РЄД.

B. Б. Ященко. — М.: МЦНМО: «ЧеРо», 2000. - 236 с.

Основы криптографии [Текст] / А. П. Алферов, А. Ю. Зубов, А. С. Кузьмин, А. В. Черемушкин. — М: Гелиос АРВ, 2001. — 480 с.

Петров, А. А. Компьютерная безопасность. Криптографические методы защиты [Текст] / А. А. Петров. — М.: ДМК, 2000. — 448 с.

Романец, Ю. В. Защита информации в компьютерных системах и сетях [Текст] / Ю. В. Романец, П. А. Тимофеева, В. Ф. Шаньгин. — М.: Радио и связь, 2001. — 376 с.

Яремчук, Ю. Є. Використання рекурентних послідовностей для побудови криптографічних методів з відкритим ключем [Текст] / Ю. Є. Яремчук // Захист інформації. — 2012. — №4. — C. 120—127.

Яремчук, Ю. Є. Метод автентифікації сторін взаємодії на основі рекурентних послідовностей [Текст] / Ю.Є. Яремчук // Сучасний захист інформації. — 2013. — №1. — С. 4—10.

Brassard, G. Modern Cryptology: A Tutorial [Текст] / G. Brassard. — Springer-Verlag, 1988. — 107 p.

Menezes, A. J. Handbook of Applied Cryptography [Текст] / A. J. Menezes, P. C. van Oorschot, S. A. Vanstone. — CRC Press, 2001. — 816 p.

Simmons, G. J. Authentication theory/coding theory [Текст] / G. J. Simmons // Proc. CRYPTO'84, Lect. Notes in Comput. Sci. — 1985. — V. 196. — Pp. 411-431.

Van Tilborg, Henk C.A. Fundamentals of cryptology. A Professional Reference and Interactive Tutorial [Текст] / Henk C.A. van Tilborg. — Kluwer Academic Publishers, 2000. — 512 p.

Yaschenko, V.B. (ed.) (2000) Introduction to cryptography. Moscow: MCNMO.

Alferov, A.P. et al. (2001) Cryptography basics. Moscow: Gelios ARV.

Petrov, A.A. (2000) Computer safety. Cryptographic methods of protection. Moscow: DMK.

Romanets, Yu.V. and Timofeeva, P.A. Information security in computer systems and networks. Moscow: Radio and Communications.

Iaremchuk, I.E. (2012). Use of recurrent sequences to construct cryptographic methods with the public key. Information Security, No. 4, pp. 120-127.

Iaremchuk, I.E. (2013). The method of authentication of parties of interaction based on recurrent sequences. Modern Information Security, No. 1, pp. 4-10.

Brassard, G. (1988) Modern Cryptology: A Tutorial. Springer-Verlag.

Menezes, A.J., van Oorschot, P.C., Vanstone, S.A. (2001). Handbook of Applied Cryptography. CRC Press.

Simmons, G. J. (1985) Authentication theory/coding theory. Proceedings of CRYPTO'84, Lecture Notes in Computer Science, V. 196, pp. 411-431.

Van Tilborg, Henk C.A. (2000). Fundamentals of cryptology. A Professional Reference and Interactive Tutorial. Kluwer Academic Publishers.

Published

2014-02-11

Issue

Section

Articles