Construction of hybrid security systems based on the crypto-code structures and flawed codes
DOI:
https://doi.org/10.15587/1729-4061.2017.108461Keywords:
hybrid cryptosystems, asymmetrical crypto-code construction, algebraic geometric codes, flawed codesAbstract
In order to ensure safety of SCCI, it is proposed to use hybrid crypto-code constructions based on the modified asymmetric crypto-code McEliece systems on flawed codes, which make it possible to obtain maximum quantity of emergent properties at minimal resource cost for initiating in the system the synergistic effect of security provision. The main difference from known approaches to the construction of hybrid cryptosystems is the use of MCCS instead of symmetric cryptosystems; to strengthen resistance and to "reduce" the alphabet power (dimensionality of field GF(26–28) to build the McEliece MCCS), the systems on flawed codes are employed.
The algorithms proposed in present work for the formation and decryption of a cryptogram in the hybrid cryptosystem based on MCCS on flawed codes make it possible to practically implement HCCSFC. The study that we conducted into energy consumption of major operations in the hybrid cryptosystems and their stability on the basis of the proposed assessment procedure confirms efficiency of their application in order to provide basic requirements to service quality in IESReferences
- Uskov, A. V., Ivannikov, A. D., Uskov, V. L. (2008). Tekhnologyi obespecheniya informatsionnoy bezopasnosti korporativnyh obrazovatel'nyh setey. Educational Technology & Society, 11 (1), 472–479.
- Gruzdeva, L. M., Monahov, M. Yu. (2012). Povyshenie proizvoditel'nosti korporativnoy seti v usloviyah vozdeystviya ugroz informatsionnoy bezopasnosti. Izvestiya vysshih uchebnyh zavedeniy. Priborostroenie, 55 (8), 53–56.
- Anikin, I. V., Emaletdinova, L. Yu., Kirpichnikov, A. P. (2015). Metody otsenki i upravleniya riskami informatsionnoy bezopasnosti v korporativnyh informatsionnyh setyah. Vestnik tekhnologicheskogo universiteta, 18 (6), 195–197.
- Nadezhdin, E. N. (2012). Problemnye voprosy upravleniya riskami informatsionnoy bezopasnosti v sfere obrazovaniya. Nauchnyy poisk, 2.6, 50–56.
- Kondratova, E. G. (2013). Sotsial'nye seti kak kanal utechki korporativnoy informatsyi. Bezopasnost' informatsionnyh tekhnologiy, 1, 107–108.
- Litvinov, V. A., Lypko, E. V., Yakovleva, A. A. Informatsionnaya bezopasnost' vysshego uchebnogo zavedeniya v ramkah sovremennoy globalizatsyi. Kontent-platforma Pandia. Available at: http://pandia.ru/text/80/257/33657.php
- Vahonin, S. (2014). Udalennyy dostup i utechka dannyh. Informatsionnaya bezopasnost', 5. Available at: http://www.itsec.ru/articles2/Inf_security/udalennyy-dostup-i-utechka-dannyh/
- Zamaraeva, O. A., Titov, V. A., Kuzin, D. O. (2014). Razrabotka politiki informatsionnoy bezopasnosti dlya ekonomicheskogo vuza: opredelenie informatsyi, podlezhashchey zashchite, i postroenie modeli zloumyshlennika. Sovremennye problemy nauki i obrazovaniya, 3. Available at: https://www.science-education.ru/ru/article/view?id=13106
- Evseev, S. P. (2017). Modelirovanie protsessov upravleniya v informatsionnoy ekonomike. Berdyansk, 420.
- Hryshchuk, R. V. (2010). Teoretychni osnovy modeliuvannia protsesiv napadu na informatsyiu metodamy teoryi dyferentsialnykh ihor ta dyferentsialnykh peretvoren. Zhytomyr: Ruta, 280.
- Hryshchuk, R. V., Danyk, Yu. H.; Danyk, Yu. H. (Ed.) (2016). Osnovy kibernetychnoi bezpeky. Zhytomyr: ZhNAEU, 636.
- Ojha, D. B., Sharma, A., Dwivedi, A., Kumar, B., Kumar, A. (2011). Transmission of Picturesque content with Code Base Cryptosystem. International Journal of Computer Technology and Applications, 02 (01), 127–131.
- Salman, A. G. (2014). Steganography application program using the ID3v2 in the MP3 audio file on mobile phone. Journal of Computer Science, 10 (7), 1249–1252. doi: 10.3844/jcssp.2014.1249.1252
- Ojha, D. B., Sharma, A., Pandey, A. D. N., Kumar, A. (2010). Space-Age Approach To Transmit Medical Image With Codebase Cryptosystem Over Noisy Channel. International Journal of Engineering Science and Technology, 2 (12), 7112–7117.
- Ojha, D. B., Sharma, A. (2011). An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel. International Journal of Advanced Networking and Applications, 2 (5), 841–845.
- Jeeva, Y. C. (2013). A Novel Approach For Information Security In Ad Hoc Networks Through Secure Key Management. Journal of Computer Science, 9 (11), 1556–1565. doi: 10.3844/jcssp.2013.1556.1565
- Yevseiev, S., Rzayev, K., Korol, O., Imanova, Z. (2016). Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (82)), 18–26. doi: 10.15587/1729-4061.2016.75250
- Hamdi, O. (2010). On the Usage of Chained Codes in Cryptography. International Journal of Computer Science and Security, 3 (6), 482–490.
- Evseev, S. P., Abdullaev, V. G., Agazade, Zh. F., Abbasova, V. S. (2016). Usovershenstvovanie metoda dvuhfaktornoy autentifikatsyi na osnove ispol'zovaniya modifitsirovannyh kripto-kodovyh skhem. Systemy obrobky informatsyi, 9 (146), 132–144.
- Yevseiev, S., Hryhorii, K., Liekariev, Y. (2016). Developing of multi-factor authentication method based on niederreiter-mceliece modified crypto-code system. Eastern-European Journal of Enterprise Technologies, 6 (4 (84)), 11–23. doi: 10.15587/1729-4061.2016.86175
- Rzaev, H. N., Iskenderzade, G. G., Samedov, F. G., Imanova, Z. B., Dzhamalova, Zh. S. (2016). Matematicheskie modeli kripto-kodovyh sredstv zashchity informatsii na osnove TKS. Zashchita informatsyi, 23, 24–26.
- McEliece, R. J. (1978). A Public-Key Criptosystem Based on Algebraic Theory. DGN Progres Report 42-44. Pasadena, C.A., 114–116.
- Niederreiter, H. (1986). Knapsack-Type Cryptosystems and Algebraic Coding Theory. Problems of Control and Information Theory, 15 (2), 159–166.
- Bleyhut, R. (1986). Teoriya i praktika kodov, kontroliruyushchih oshibki. Moscow: Mir, 576.
- Klark, Dzh.-ml.; Tsybakov, B. S. (Ed.) (1987). Kodirovanie s ispravleniem oshibok v sistemah tsifrovoy svyazi. Moscow: Radio i svyaz', 392.
- Mak-Vil'yams, F. Dzh., Sloen, N. Dzh. A. (1979). Teoriya kodov, ispravlyayushchih oshibki. Moscow: Svyaz', 744.
- Muter, V. M. (1990). Osnovy pomekhoustoychivoy teleperedachi informatsyi. Leningrad: Energoatomizdat, 288.
- Kasami, T., Tokura, N., Ivadari, E., Inagaki, Ya.; Tsybakov, B. S., Gel'fand, S. I. (Eds.) (1978). Teoriya kodirovaniya. Moscow: Mir, 576.
- Sidel'nikov, V. M. (2002). Kriptografiya i teoriya kodirovaniya. Moskovskiy universitet i razvitie kriptografii v Rossyi. Moscow, 22.
- Mishchenko, V. A., Vilanskiy, Yu. V. (2007). Ushcherbnye teksty i mnogokanal'naya kriptografiya. Minsk: Entsiklopediks, 292.
- Mishchenko, V. A., Vilanskiy, Yu. V., Lepin, V. V. (2006). Kriptograficheskiy algoritm MV 2. Minsk, 177.
- Shennon, K. (1963). Teoriya svyazi v sekretnyh sistemah. Raboty po teoryi informatsyi i kibernetike. Moscow, 333–369.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Simon Kuznets Kharkiv National University of Economics
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.