Research of the properties of hybrid crypto-code constructions

Authors

  • Сергей Петрович Евсеев Kharkov National Economic University named after Semen Kuznets
  • Сергей Эдуардович Остапов Chernivtsi National University named after Yuri Fedkovich
  • Иван Викторович Белодед Kharkov National Economic University named after Semen Kuznets

DOI:

https://doi.org/10.18372/2410-7840.19.12206

Keywords:

hybrid crypto-code designs, modified McAllis crypto-code system, maladaptive codes, modified elliptic codes

Abstract

The methods for constructing hybrid crypto-code constructions with defective codes (GKKKUK) based on the synthesis of modified non-symmetric crypto-code systems McEliece (MNCCS) on elliptic codes (EC) with multi-channel cryptographic systems on defective codes, exchange protocols for securing confidentiality in IP networks. The basic criteria of cryptosystems are investigated. Theoretical bases of decrease in 2 - 3 times power capacity of MNCCS McEliece with EС and hybrid designs of MNCCS with defective codes due to reduction of power of the Galois field. The required level of cryptographic strength of the hybrid cryptosystem as a whole is provided for their software implementation. The results of statistical stability studies based on the NIST STS 822 package are obtained.

Author Biographies

Сергей Петрович Евсеев, Kharkov National Economic University named after Semen Kuznets

PhD, Senior Researcher, Associate Professor of the Information Systems Department of the Kharkov National Economic University named after Semen Kuznets

Сергей Эдуардович Остапов, Chernivtsi National University named after Yuri Fedkovich

Doctor of Sciences (Physics and Mathematics), Professor, Head of the Computer Systems Software Department of the Chernivtsi National University named after Yuri Fedkovich

Иван Викторович Белодед, Kharkov National Economic University named after Semen Kuznets

student of the Kharkiv National University of Economics named after Semen Kuznets

References

ISO 9000:2015(en) Quality management systems – Fundamentals and vocabulary [Electronic resource]. Access: https://www.iso.org/obp/ui/ # iso: std: iso: 9000:ed-4:v1:en.

CISCO: Кибератаки на индустриальные системы усиливаются, а доверие к имеющимся системам защиты падает. [Электронный ресурс]. Режим доступа: https: // www. cisco. com / c / ru _ ru/ about/ press/press-releases/2016/01-21a.html.

Rise of IoT Botnets Showcases Cybercriminals’ Ability to Find New Avenues of Attack. [Электронный ресурс]. Режим доступа: http: // storage. pardot. com / 44731/ 127332/ Cybercrime_ Trends_ Report___2016_Year_in_Review__1_.pdf.

Исследование HP: Средний годовой ущерб от кибератак вырос до 15 млн долл. на организацию. [Электронный ресурс]. Режим доступа: http: // www. connect-wit.ru/issledovanie-hp-crednij-godovoj-ushherb-ot-kiberatak-vyros-do-15-mln-doll-na-organizatsiyu.html.

Х. Рзаев, Г. Искендерзаде, Ф. Самедов, З. Имано-ва, Ж. Джамалова, "Математические модели крипто-кодовых средств защиты информации на основе ТКС", Защита информации: сборник научных трудов НАУ, вып. 23, С. 24-26, 2016.

B. Biswas and N. Sendrier, "McEliece Cryptosystem Implementation: Theory and Practice", PQCrypto 2008, Springer-Verlag Berlin Heidelberg 2008, LNCS 5299, pp. 47–62, 2008.

В. Дудыкевич, Б. Томашевский, С. Евсеев, "Аналіз методів захисту інформації доказової стійкості з використанням секретних систем на алгебраїчних блокових кодах", Науково-технічний журнал «Інформаційна безпека». №2 (2), с. 17-26, 2009.

Р. Блейхут, Теория и практика кодов, контролирующих ошибки: пер. с англ., М.: Мир, 1986.

V. Mishhenko, Ju. Vilanskij, Ushherbnye teksty i mnogokanal'naja kriptografija, Jenciklopediks., 2007, 292 p.

V. Mishhenko, Ju. Vilanskij, V. Lepin, "Kripto-graficheskij algoritm MV 2", 2006, 177 p.

A. Rukhin, J. Soto, "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications", NIST Special Publication 800-22, 09.2000.

Published

2017-12-11

Issue

Section

Articles