Construction of hybrid security systems based on the crypto-code structures and flawed codes

Authors

DOI:

https://doi.org/10.15587/1729-4061.2017.108461

Keywords:

hybrid cryptosystems, asymmetrical crypto-code construction, algebraic geometric codes, flawed codes

Abstract

In order to ensure safety of SCCI, it is proposed to use hybrid crypto-code constructions based on the modified asymmetric crypto-code McEliece systems on flawed codes, which make it possible to obtain maximum quantity of emergent properties at minimal resource cost for initiating in the system the synergistic effect of security provision. The main difference from known approaches to the construction of hybrid cryptosystems is the use of MCCS instead of symmetric cryptosystems; to strengthen resistance and to "reduce" the alphabet power (dimensionality of field GF(26–28) to build the McEliece MCCS), the systems on flawed codes are employed.

The algorithms proposed in present work for the formation and decryption of a cryptogram in the hybrid cryptosystem based on MCCS on flawed codes make it possible to practically implement HCCSFC. The study that we conducted into energy consumption of major operations in the hybrid cryptosystems and their stability on the basis of the proposed assessment procedure confirms efficiency of their application in order to provide basic requirements to service quality in IES

Author Biographies

Serhii Yevseiev, Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166

PhD, Associate Professor

Department of Information Systems 

Olga Korol, Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166

PhD, Associate Professor

Department of Information Systems 

Hryhorii Kots, Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166

PhD, Associate Professor

Department of Information Systems 

References

  1. Uskov, A. V., Ivannikov, A. D., Uskov, V. L. (2008). Tekhnologyi obespecheniya informatsionnoy bezopasnosti korporativnyh obrazovatel'nyh setey. Educational Technology & Society, 11 (1), 472–479.
  2. Gruzdeva, L. M., Monahov, M. Yu. (2012). Povyshenie proizvoditel'nosti korporativnoy seti v usloviyah vozdeystviya ugroz informatsionnoy bezopasnosti. Izvestiya vysshih uchebnyh zavedeniy. Priborostroenie, 55 (8), 53–56.
  3. Anikin, I. V., Emaletdinova, L. Yu., Kirpichnikov, A. P. (2015). Metody otsenki i upravleniya riskami informatsionnoy bezopasnosti v korporativnyh informatsionnyh setyah. Vestnik tekhnologicheskogo universiteta, 18 (6), 195–197.
  4. Nadezhdin, E. N. (2012). Problemnye voprosy upravleniya riskami informatsionnoy bezopasnosti v sfere obrazovaniya. Nauchnyy poisk, 2.6, 50–56.
  5. Kondratova, E. G. (2013). Sotsial'nye seti kak kanal utechki korporativnoy informatsyi. Bezopasnost' informatsionnyh tekhnologiy, 1, 107–108.
  6. Litvinov, V. A., Lypko, E. V., Yakovleva, A. A. Informatsionnaya bezopasnost' vysshego uchebnogo zavedeniya v ramkah sovremennoy globalizatsyi. Kontent-platforma Pandia. Available at: http://pandia.ru/text/80/257/33657.php
  7. Vahonin, S. (2014). Udalennyy dostup i utechka dannyh. Informatsionnaya bezopasnost', 5. Available at: http://www.itsec.ru/articles2/Inf_security/udalennyy-dostup-i-utechka-dannyh/
  8. Zamaraeva, O. A., Titov, V. A., Kuzin, D. O. (2014). Razrabotka politiki informatsionnoy bezopasnosti dlya ekonomicheskogo vuza: opredelenie informatsyi, podlezhashchey zashchite, i postroenie modeli zloumyshlennika. Sovremennye problemy nauki i obrazovaniya, 3. Available at: https://www.science-education.ru/ru/article/view?id=13106
  9. Evseev, S. P. (2017). Modelirovanie protsessov upravleniya v informatsionnoy ekonomike. Berdyansk, 420.
  10. Hryshchuk, R. V. (2010). Teoretychni osnovy modeliuvannia protsesiv napadu na informatsyiu metodamy teoryi dyferentsialnykh ihor ta dyferentsialnykh peretvoren. Zhytomyr: Ruta, 280.
  11. Hryshchuk, R. V., Danyk, Yu. H.; Danyk, Yu. H. (Ed.) (2016). Osnovy kibernetychnoi bezpeky. Zhytomyr: ZhNAEU, 636.
  12. Ojha, D. B., Sharma, A., Dwivedi, A., Kumar, B., Kumar, A. (2011). Transmission of Picturesque content with Code Base Cryptosystem. International Journal of Computer Technology and Applications, 02 (01), 127–131.
  13. Salman, A. G. (2014). Steganography application program using the ID3v2 in the MP3 audio file on mobile phone. Journal of Computer Science, 10 (7), 1249–1252. doi: 10.3844/jcssp.2014.1249.1252
  14. Ojha, D. B., Sharma, A., Pandey, A. D. N., Kumar, A. (2010). Space-Age Approach To Transmit Medical Image With Codebase Cryptosystem Over Noisy Channel. International Journal of Engineering Science and Technology, 2 (12), 7112–7117.
  15. Ojha, D. B., Sharma, A. (2011). An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel. International Journal of Advanced Networking and Applications, 2 (5), 841–845.
  16. Jeeva, Y. C. (2013). A Novel Approach For Information Security In Ad Hoc Networks Through Secure Key Management. Journal of Computer Science, 9 (11), 1556–1565. doi: 10.3844/jcssp.2013.1556.1565
  17. Yevseiev, S., Rzayev, K., Korol, O., Imanova, Z. (2016). Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (82)), 18–26. doi: 10.15587/1729-4061.2016.75250
  18. Hamdi, O. (2010). On the Usage of Chained Codes in Cryptography. International Journal of Computer Science and Security, 3 (6), 482–490.
  19. Evseev, S. P., Abdullaev, V. G., Agazade, Zh. F., Abbasova, V. S. (2016). Usovershenstvovanie metoda dvuhfaktornoy autentifikatsyi na osnove ispol'zovaniya modifitsirovannyh kripto-kodovyh skhem. Systemy obrobky informatsyi, 9 (146), 132–144.
  20. Yevseiev, S., Hryhorii, K., Liekariev, Y. (2016). Developing of multi-factor authentication method based on niederreiter-mceliece modified crypto-code system. Eastern-European Journal of Enterprise Technologies, 6 (4 (84)), 11–23. doi: 10.15587/1729-4061.2016.86175
  21. Rzaev, H. N., Iskenderzade, G. G., Samedov, F. G., Imanova, Z. B., Dzhamalova, Zh. S. (2016). Matematicheskie modeli kripto-kodovyh sredstv zashchity informatsii na osnove TKS. Zashchita informatsyi, 23, 24–26.
  22. McEliece, R. J. (1978). A Public-Key Criptosystem Based on Algebraic Theory. DGN Progres Report 42-44. Pasadena, C.A., 114–116.
  23. Niederreiter, H. (1986). Knapsack-Type Cryptosystems and Algebraic Coding Theory. Problems of Control and Information Theory, 15 (2), 159–166.
  24. Bleyhut, R. (1986). Teoriya i praktika kodov, kontroliruyushchih oshibki. Moscow: Mir, 576.
  25. Klark, Dzh.-ml.; Tsybakov, B. S. (Ed.) (1987). Kodirovanie s ispravleniem oshibok v sistemah tsifrovoy svyazi. Moscow: Radio i svyaz', 392.
  26. Mak-Vil'yams, F. Dzh., Sloen, N. Dzh. A. (1979). Teoriya kodov, ispravlyayushchih oshibki. Moscow: Svyaz', 744.
  27. Muter, V. M. (1990). Osnovy pomekhoustoychivoy teleperedachi informatsyi. Leningrad: Energoatomizdat, 288.
  28. Kasami, T., Tokura, N., Ivadari, E., Inagaki, Ya.; Tsybakov, B. S., Gel'fand, S. I. (Eds.) (1978). Teoriya kodirovaniya. Moscow: Mir, 576.
  29. Sidel'nikov, V. M. (2002). Kriptografiya i teoriya kodirovaniya. Moskovskiy universitet i razvitie kriptografii v Rossyi. Moscow, 22.
  30. Mishchenko, V. A., Vilanskiy, Yu. V. (2007). Ushcherbnye teksty i mnogokanal'naya kriptografiya. Minsk: Entsiklopediks, 292.
  31. Mishchenko, V. A., Vilanskiy, Yu. V., Lepin, V. V. (2006). Kriptograficheskiy algoritm MV 2. Minsk, 177.
  32. Shennon, K. (1963). Teoriya svyazi v sekretnyh sistemah. Raboty po teoryi informatsyi i kibernetike. Moscow, 333–369.

Downloads

Published

2017-08-30

How to Cite

Yevseiev, S., Korol, O., & Kots, H. (2017). Construction of hybrid security systems based on the crypto-code structures and flawed codes. Eastern-European Journal of Enterprise Technologies, 4(9 (88), 4–21. https://doi.org/10.15587/1729-4061.2017.108461

Issue

Section

Information and controlling system