Possibilities for authentication of the interaction parties based on recurrent sequences
DOI:
https://doi.org/10.18372/2410-7840.15.5509Keywords:
information security, cryptography, authentication, recurrent sequenceAbstract
To date, for solving the integrity provision problem of broad utilization, we received protocols of authentication and digital signature. Amongst them, protocols of the parties to interaction hold an important place, when a checkup of the fact that the interacting party is the self-identified party, is conducted by one party. The existing authentication methods are based mainly on operations of exponentiation, requiring implementation of complex calculations, affecting the speed of the method at the stage of its practical implementation. We consider a possibility of creating an authentication method of the interaction parties based on the mathematical apparatus of recurrent sequences, based on the proportions in which the initial elements are associated with the coefficients. We have worked out a protocol implementing the method. The proposed method, compared with the known analogues, allowed to increase the cryptographic reliability of the authentication process, and the ability to change the reliability of the method depending on the sequence order. The presented developments made it possible to expand the use of authentication methods, especially in protection systems with high level of secrecy.
References
Введение в криптографию [Текст] / под общ. РЄД.
B. Б. Ященко. — М.: МЦНМО: «ЧеРо», 2000. - 236 с.
Основы криптографии [Текст] / А. П. Алферов, А. Ю. Зубов, А. С. Кузьмин, А. В. Черемушкин. — М: Гелиос АРВ, 2001. — 480 с.
Петров, А. А. Компьютерная безопасность. Криптографические методы защиты [Текст] / А. А. Петров. — М.: ДМК, 2000. — 448 с.
Романец, Ю. В. Защита информации в компьютерных системах и сетях [Текст] / Ю. В. Романец, П. А. Тимофеева, В. Ф. Шаньгин. — М.: Радио и связь, 2001. — 376 с.
Яремчук, Ю. Є. Використання рекурентних послідовностей для побудови криптографічних методів з відкритим ключем [Текст] / Ю. Є. Яремчук // Захист інформації. — 2012. — №4. — C. 120—127.
Яремчук, Ю. Є. Метод автентифікації сторін взаємодії на основі рекурентних послідовностей [Текст] / Ю.Є. Яремчук // Сучасний захист інформації. — 2013. — №1. — С. 4—10.
Brassard, G. Modern Cryptology: A Tutorial [Текст] / G. Brassard. — Springer-Verlag, 1988. — 107 p.
Menezes, A. J. Handbook of Applied Cryptography [Текст] / A. J. Menezes, P. C. van Oorschot, S. A. Vanstone. — CRC Press, 2001. — 816 p.
Simmons, G. J. Authentication theory/coding theory [Текст] / G. J. Simmons // Proc. CRYPTO'84, Lect. Notes in Comput. Sci. — 1985. — V. 196. — Pp. 411-431.
Van Tilborg, Henk C.A. Fundamentals of cryptology. A Professional Reference and Interactive Tutorial [Текст] / Henk C.A. van Tilborg. — Kluwer Academic Publishers, 2000. — 512 p.
Yaschenko, V.B. (ed.) (2000) Introduction to cryptography. Moscow: MCNMO.
Alferov, A.P. et al. (2001) Cryptography basics. Moscow: Gelios ARV.
Petrov, A.A. (2000) Computer safety. Cryptographic methods of protection. Moscow: DMK.
Romanets, Yu.V. and Timofeeva, P.A. Information security in computer systems and networks. Moscow: Radio and Communications.
Iaremchuk, I.E. (2012). Use of recurrent sequences to construct cryptographic methods with the public key. Information Security, No. 4, pp. 120-127.
Iaremchuk, I.E. (2013). The method of authentication of parties of interaction based on recurrent sequences. Modern Information Security, No. 1, pp. 4-10.
Brassard, G. (1988) Modern Cryptology: A Tutorial. Springer-Verlag.
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A. (2001). Handbook of Applied Cryptography. CRC Press.
Simmons, G. J. (1985) Authentication theory/coding theory. Proceedings of CRYPTO'84, Lecture Notes in Computer Science, V. 196, pp. 411-431.
Van Tilborg, Henk C.A. (2000). Fundamentals of cryptology. A Professional Reference and Interactive Tutorial. Kluwer Academic Publishers.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).