CRYPTO-CODE CONSTRUCTIONS ON LDPC CODES PROPERTIES ASSESSMENT

Authors

DOI:

https://doi.org/10.18372/2225-5036.30.19244

Keywords:

modified McEliece crypto-code constructions, post-quantum era, codes with low density of parity checks

Abstract

The growth of mobile technologies and computing power has significantly expanded the range of digital services and actually outpaced the development of computer technology. This promotes the use of mobile and wireless networks in most areas of smart technologies and supports the further combination of cyberspace with the mobile Internet. However, the lack of security protocols that ensure the confidentiality and integrity of data in the early stages of LTE technology implementation creates conditions for cybercriminals to use mobile Internet channels to conduct APT attacks. With the development and appearance of a full-fledged quantum computer that uses the Shor and Grover algorithms, a significant decrease in the stability of cryptosystems built on the basis of symmetric and asymmetric cryptography, including cryptography on elliptic curves, is possible. In addition, modern cyber threats show signs of synergy and hybridity, and their combination with social engineering methods makes it difficult to implement effective preventive measures. The paper proposes post-quantum cryptosystems based on the McAleese crypto-code scheme, which uses low density parity check codes (LDPC codes). This approach allows for easy integration into wireless networks that comply with IEEE 802.16 and IEEE 802.15.4 standards, as well as LTE technologies, providing an adequate level of protection against modern threats.

 

References

Р. В. Грищук, Ю. Г. Даник; за заг. ред. проф. Ю. Г. Даника, “Основи кібербезпеки”, Житомир : ЖНАЕУ, 636 с., 2016.

Report on Post-Quantum Cryptography // [Online], available: http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf

A Comprehensive Survey of Prominent Cryptographic Aspects for Securing Communication in Post-Quantum IoT Networks // URL: https://www.sciencedirect.com/science/article/pii/S2542660520300159.

А. Кузнєцов, А. Пушкарьов, С. Кавун, В. Калашніков. (2016) Несиметричні криптосистеми на основі кодування алгебри: сучасний стан, існуючі протиріччя та перспективи практичного використання на пост-квантовий період. URL: https://openarchive.nure.ua/handle/document/4642

А.А. Кузнєцов, А.І. Пушкарьов, І.І. Сватовський, А.В. Шевцов (2016). Несиметричні криптосистеми на кодах алгебри для постквантового періоду URL: https://periodicals.karazin.ua/cscs/article/download/7839/9850/

О. Кузнецов, А. Пушкарьов, О. Шевцов, Т. Кузнецова (2016) Несиметричне криптографічне перетворення з використанням алгебраїчних блокових кодів URL: https://jrnl.nau.edu.ua/index.php/ZI/article/view/11088/14762

Загрози безпеки ядра пакетної мережі 4G // URL: https: https://www.ptsecurity.com/ru-ru/research/analytics/epc-2017/

Уразливості протоколу Diameter у мережах 4G // URL: https://www.ptsecurity.com/ru-ru/research/analytics/diameter-2018/

Guide to LTE Security // URL:csrc.nist.gov/publications/drafts/80 187/sp800_187_draft.pdf

H. Niederreiter, “Knapsack-Type Cryptosystems and Algebraic Coding Theory”, Probl. Control and Inform. Theory, V.15, р. 19 – 34, 1986.

Modeling of security systems for critical infrastructure facilities: monograph / S. Yevseiev, R. Hryshchuk, K. Molodetska, M. Nazarkevych and others. – Kharkiv: PC TECHNOLOGY CENTER, 2022. – 196 p.,

Pohasii Serhii, Yevseiev Serhii, Zhuchenko Oleksandr, Milov Oleksand, Lysechko Volodymyr, Kovalenko Oleksandr, Kostiak Maryna, Volkov Andrii, Lezik Aleksandr, Susukailo Vitalii. Development of crypto code structures on ldpc-codes. Eastern-European Journal of Enterprise Technologies. 2022. 2/9 (116). P. 44–59

Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2.

Yevseiev S. and other Development of Niederreiter hybrid crypto-code structure on flawed codes. Eastern-European Journal of Enterprise Technologies, 1/9 (97). p. 27 –37, 2019

Yevseiev S., Korol O., Kots H., “Construction of hybrid security systems based on the crypto-code structures and flawed codes”, Eastern-European Journal of Enterprise Technologies, 4/9(88), p. 4 – 20, 2017.

Yevseiev S., Kots H., and Liekariev Y., (2016).“Developing of multi-factor authentication method based on Niederreiter-McEliece modified crypto-code system”, Eastern-European Journal of Enterprise Technologies, 6/4(84), p. 11 – 23

Yevseiev S., Rzayev, K., Korol, O., Imanova, Z. (2016). Development of McEliece modified asymmetric crypto-code system on elliptic truncated codes. Eastern-European Journal of Enterprise Technologies, 4(9-82), р. 18–26

QC-MDPC-McEliece: A public-key code-based encryption scheme based on quasi-cyclic moderate density parity check codes. URL: https://hal.archives-ouvertes.fr/hal-01095935.

3GPP TS 38.212 V15.3.0. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; NR; Multiplexing and channel coding (Release 15).

Published

2024-12-03