Modifications of niederreiter crypto-code construction

Authors

DOI:

https://doi.org/10.15587/2313-8416.2019.189621

Keywords:

Niederreiter modified crypto-code construction, modified shortened elliptic codes, equilibrium coding, informational secrecy

Abstract

Studies of the Niederreiter crypto-code construction at MES have revealed the main reason for the impossibility of practical implementation of decoding algorithms with non-binary codes in the classical scheme. It has been established that fixing a subset of plaintexts is required, for which the error localization procedure cannot be performed with masking selected private matrices X, P, and D. The modified algorithm is developed by shortening the source data and fixing the allowable positional plaintext transformation vectors based on equilibrium coding

Author Biography

Oleksii Tsyhanenko, Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166

Postgraduate Student

Department of Cyber Security and Information Technology

References

Dinh, H., Moore, C., Russell, A. (2019). McEliece and Niederreiter Cryptosystems that Resist Quantum Fourier Sampling Attacks. Heidelberg: Springer-Verlag Berlin, 761–779. Available at: https://dl.acm.org/citation.cfm?id=2033093 Last accessed: 01.12.2019

Sidelnikov, V. M. (2008). Teoriia kodirovaniia. Moscow: FIZMATLIT, 324.

Yevseiev, S., Tsyhanenko, O., Ivanchenko, S., Aleksiyev, V., Verheles, D., Volkov, S. et. al. (2018). Practical implementation of the Niederreiter modified crypto­code system on truncated elliptic codes. Eastern-European Journal of Enterprise Technologies, 6 (4 (96)), 24–31. doi: http://doi.org/10.15587/1729-4061.2018.150903

Cho, J. Y., Griesser, H., Rafique, D. (2017). A McEliece-Based Key Exchange Protocol for Optical Communication Systems. Lecture Notes in Electrical Engineering, 109–123. doi: http://doi.org/10.1007/978-3-319-59265-7_8

Yevseiev, S., Rzayev, K., Korol, O., Imanova, Z. (2016). Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (82)), 18–26. doi: http://doi.org/10.15587/1729-4061.2016.75250

Yevseiev, S., Tsyhanenko, O. (2018). Development of asymmetrical crypto-coded construction of niderraiter on modified codes. Sistemi obrobki іnformacіi, 2 (153), 127–135. doi: http://doi.org/10.30748/soi.2018.153.16

Dudykevych, V. B., Kuznetsov, O. O., Tomashevskyi, B. P. (2010). Krypto-kodovyi zakhyst informatsii z nedviikovym rivnovahovym koduvanniam. Suchasnyi zakhyst informatsii, 2, 14–23.

Dudykevych, V. B., Kuznietsov, O. O., Tomashevskyi, B. P. (2010). Metod nedviikovoho rivnovahovoho koduvannia. Suchasnyi zakhyst informatsii, 3, 57–68.

De Vries, S. (2016). Achieving 128-bit Security againstQuantum Attacks in OpenVPN. Available at: https://internetscriptieprijs.nl/wp-content/uploads/2017/04/1-Simon-de-Vries-UT.pdf Last accessed: 01.12.2019

Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D. (2014). Enhanced public key security for the McEliece cryptosystem. Available at: https://arxiv.org/abs/1108.2462 Last accessed: 01.12.2019

Yevseiev, S., Tsyhanenko, O., Gavrilova, A., Guzhva, V., Milov, O., Moskalenko, V. et. al. (2019). Development of Niederreiter hybrid crypto-code structure on flawed codes. Eastern-European Journal of Enterprise Technologies, 1 (9 (97)), 27–38. doi: http://doi.org/10.15587/1729-4061.2019.156620

Yevseiev, S., Shmatko, O., Tsyhanenko, O. (2019). Metodologicheskiye osnovy postroyeniya kriptostoykikh kriptosistem Mak-Elisa i Niderraytera na algebrogeometricheskikh kodakh v postkvantovoy kriptografii. 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies. Ankara.

Published

2019-12-28

Issue

Section

Technical Sciences