Specialized processors for authentication of the interaction parties based on recurrent sequences
DOI:
https://doi.org/10.18372/2410-7840.15.4219Keywords:
specialized processors, information security, cryptography, authentication, recurrent sequenceAbstract
In this work, we consider the mathematical apparatus of recurrent and sequences, as well as a possibility of constructing an authentication method for the parties, based on it. For the proposed method, we developed principles of specialized processors with a possibility for each party of interaction to prove and validate the authenticity. Comparison of the speed of the developed processors with the known analogues showed that, under certain conditions, the work time of the developed specialized authentication processors will be dozens of times less than the processors implementing the known methods. The developed specialized processors have a perspective to be used in various cryptographic tasks, based on the public key technology.
References
Романец Ю. В., Тимофеева П. А., Шаньгин В. Ф. Защита информации в компьютерных системах и сетях. – М.: Радио и связь, 2001. – 376 с.
Menezes A. J., van Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography. – CRC Press, 2001. – 816 p.
Алферов А. П., Зубов А. Ю., Кузьмин А. С., Черемушкин А. В. Основы криптографии. – М: Гелиос АРВ, 2001. – 480 с.
Введение в криптографию / Под общ. рeд. В.Б. Ященко. – М.: МЦНМО: «ЧеРо», 2000. – 236 с.
Петров А. А. Компьютерная безопасность. Криптографические методы защиты. – М.: ДМК, 2000. – 448 с.
Брассар Ж. Современная криптология. – М.: ПОЛИМЕД, 1999. – 176 с.
Simmons G. J., Authentication theory/coding theory // Proc. CRYPTO'84, Lect. Notes in Comput. Sci. – V. 196, 1985. – Pp. 411-431.
Яремчук Ю.Є. Метод автентифікації сторін взаємодії на основі рекурентних послідовностей // Сучасний захист інформації. – №1, 2013. – С. 4–10.
Яремчук Ю.Є. Використання рекурентних послідовностей для побудови криптографічних методів з відкритим ключем // Захист інформації. – №4, 2012. – С. 120–127.
Romanets Yu.V., Timofeeva P.A., Shangin V.F. Information protection in computer systems and networks, M.: Radio and communication, 2001, 376 p.
Menezes A. J., van Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography, CRC Press, 2001, 816 p.
Alferov A.P., Zubov A.Yu., Kuzmin A.S., Cheremushkin A.V. Foundations of cryptography, M: Helios ARV, 2001, 480 p.
Introduction to Cryptography / Ed. red. V.B. Yaschenko. - M: MCCME "CheRo", 2000, 236 p.
Petrov A.A. Computer Security. Cryptographic protection methods. - M.: DMK, 2000, 448 p.
Brassard J. Modern cryptology. - M: Polimed, 1999 , 176 p.
Simmons G. J., Authentication theory/coding theory // Proc. CRYPTO'84, Lect. Notes in Comput. Sci. – V. 196, 1985. – Pp. 411-431.
Yaremchuk Yu.Ye. Authentication Method party interaction based on recurrent sequences /Suchasnyy zahist informatsii, № 1, 2013, P. 4-10.
Yaremchuk Yu.Ye. Using recursive sequences for constructing cryptographic techniques with public key / Information Security, № 4, 2012, P. 120-127.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).