Research of the properties of hybrid crypto-code constructions
DOI:
https://doi.org/10.18372/2410-7840.19.12206Keywords:
hybrid crypto-code designs, modified McAllis crypto-code system, maladaptive codes, modified elliptic codesAbstract
The methods for constructing hybrid crypto-code constructions with defective codes (GKKKUK) based on the synthesis of modified non-symmetric crypto-code systems McEliece (MNCCS) on elliptic codes (EC) with multi-channel cryptographic systems on defective codes, exchange protocols for securing confidentiality in IP networks. The basic criteria of cryptosystems are investigated. Theoretical bases of decrease in 2 - 3 times power capacity of MNCCS McEliece with EС and hybrid designs of MNCCS with defective codes due to reduction of power of the Galois field. The required level of cryptographic strength of the hybrid cryptosystem as a whole is provided for their software implementation. The results of statistical stability studies based on the NIST STS 822 package are obtained.
References
ISO 9000:2015(en) Quality management systems – Fundamentals and vocabulary [Electronic resource]. Access: https://www.iso.org/obp/ui/ # iso: std: iso: 9000:ed-4:v1:en.
CISCO: Кибератаки на индустриальные системы усиливаются, а доверие к имеющимся системам защиты падает. [Электронный ресурс]. Режим доступа: https: // www. cisco. com / c / ru _ ru/ about/ press/press-releases/2016/01-21a.html.
Rise of IoT Botnets Showcases Cybercriminals’ Ability to Find New Avenues of Attack. [Электронный ресурс]. Режим доступа: http: // storage. pardot. com / 44731/ 127332/ Cybercrime_ Trends_ Report___2016_Year_in_Review__1_.pdf.
Исследование HP: Средний годовой ущерб от кибератак вырос до 15 млн долл. на организацию. [Электронный ресурс]. Режим доступа: http: // www. connect-wit.ru/issledovanie-hp-crednij-godovoj-ushherb-ot-kiberatak-vyros-do-15-mln-doll-na-organizatsiyu.html.
Х. Рзаев, Г. Искендерзаде, Ф. Самедов, З. Имано-ва, Ж. Джамалова, "Математические модели крипто-кодовых средств защиты информации на основе ТКС", Защита информации: сборник научных трудов НАУ, вып. 23, С. 24-26, 2016.
B. Biswas and N. Sendrier, "McEliece Cryptosystem Implementation: Theory and Practice", PQCrypto 2008, Springer-Verlag Berlin Heidelberg 2008, LNCS 5299, pp. 47–62, 2008.
В. Дудыкевич, Б. Томашевский, С. Евсеев, "Аналіз методів захисту інформації доказової стійкості з використанням секретних систем на алгебраїчних блокових кодах", Науково-технічний журнал «Інформаційна безпека». №2 (2), с. 17-26, 2009.
Р. Блейхут, Теория и практика кодов, контролирующих ошибки: пер. с англ., М.: Мир, 1986.
V. Mishhenko, Ju. Vilanskij, Ushherbnye teksty i mnogokanal'naja kriptografija, Jenciklopediks., 2007, 292 p.
V. Mishhenko, Ju. Vilanskij, V. Lepin, "Kripto-graficheskij algoritm MV 2", 2006, 177 p.
A. Rukhin, J. Soto, "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications", NIST Special Publication 800-22, 09.2000.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).