Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes
DOI:
https://doi.org/10.15587/1729-4061.2016.75250Keywords:
asymmetric crypto-code system, theoretical-code scheme, modified error-correcting codesAbstract
Symmetric and asymmetric cryptographic algorithms, providing the required level of cryptographic strength are generally used to ensure security in modern communication systems, and error-correcting coding techniques - to ensure reliability. The use of asymmetric crypto-code systems enables integrated (with one mechanism) provision of the required levels of reliability, security and efficiency in the processing and transmission of confidential information via open channels of telecommunication systems. The research confirms that their usage provides high performance on the level of symmetric encryption algorithms with BSSH, provable cryptographic strength based on theoretical and complexity problems in arbitrary code decoding (1030 – 1035 group operations are provided), and reliability through the use of a shortened algebra-geometric code (Рош10-9 – 10-12 is provided). A major disadvantage of the use of the McEliece cryptographic system are large amounts of critical data (to provide the required cryptographic strength it is necessary to build a system in the GF (210 –213). In order to reduce the volume of key data (public key), we propose to use shortened codes, that enables to reduce the GF(26 –28), while maintaining a cryptographic strength level, by introducing the character location entropy at initialization vector.
References
- Semenov, S. G., Smirnov, A. A., Meleshko, E. V. (2011). Modeli i metody upravleniya setevymi resursami v informatsionno-telekommunikatsionnykh sistemakh [Models and methods of network resource management in information and telecommunication systems]. Kharkov: NTU "KhPI", 212.
- Rzaev, H. N., Korol', O. G.; Ponomarenko, V. S. (Ed.) (2016) Analiz sostojanija i putej sovershenstvovanija protokolov bezopasnosti sovremennyh telekommunikacionnyh setej. Informacionnye tehnologii v upravlenii, obrazovanii, nauke i promyshlennosti. Kharkov: Izdatel' Rozhko S. G., 217–234.
- Telekommunikacionnye uslugi v mirovoj jekonomike [Telecommunication services in national economics]. Available at: http://www.gumer.info/bibliotek_Buks/Econom/world_econom/30.php
- Korol', O. G. (2012). Protokoly bezopasnosti telekommunikacionnyh setej [Protocols of telecommunication network security]. Sistemi obrobki іnformacіі, 6 (104), 113–120.
- Ojha, D. B., Sharma, A., Dwivedi, A., Kumar, B., Kumar, A. (2011). Transmission of Picturesque content with Code Base Cryptosystem. International Journal of Computer Technology and Applications, 02 (01), 127–131. Available at: https://doaj.org/article/6714b60516cc4aa79e56d0c421febaf3
- Salman, A. G. (2014). Steganography application program using the ID3v2 in the MP3 audio file on mobile phone. Journal of Computer Science, 10 (7), 1249–1252. doi: 10.3844/jcssp.2014.1249.1252
- Ojha, D. B., Sharma, A., Pandey, A. D. N., Kumar, A. (2010). Space-Age Approach To Transmit Medical Image With Codebase Cryptosystem Over Noisy Channel. International Journal of Engineering Science and Technology, 2 (12), 7112–7117. Available at: https://doaj.org/article/5c7da3a1e3ec4f83b552199034bd3241
- Ojha, D. B., Sharma, A. (2011). An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel. International Journal of Advanced Networking and Applications, 2 (5), 841–845. Available at: https://doaj.org/article/39a3ac65d5b24b348f069dfc82eb6248
- Jeeva, Y. C. (2013). A Novel Approach For Information Security In Ad Hoc Networks Through Secure Key Management. Journal of Computer Science, 9 (11), 1556–1565. Available at: https://doaj.org/article/378b88837cdf4cab9f8010a38a6aeb2b
- McEliece, R. J. (1978). A Public-Key Criptosystem Based on Algebraic Theory. DGN Progres Report 42-44. Pasadena, C.A., 114–116.
- Niederreiter, H. (1986). Knapsack-Type Cryptosystems and Algebraic Coding Theory. Problems of Control and Information Theory, 15 (2), 159–166.
- Sidel'nikov, V. M. (2002). Kriptografija i teorija kodirovanija [Cryptography and coding theory]. Moskovskij universitet i razvitie kriptografii v Rossii. Moscow, 22.
- Evseev, S. P., Tomashevskij, B. P. (2011). Issledovanie teoretiko-kodovyh shem dlja kompleksnogo obespechenija bezopasnosti i dostovernosti dannyh v informacionnyh sistemah [Theoretic code scheme research for providing overall security and authenticity of data in information systems]. Naukovij vіsnik Chernіvec'kogo unіversitetu. Serіja: Komp’juternі sistemi ta komponenti, 2 (1), 6–14.
- Rzaev, H. N., Iskenderzade, G. G., Samedov, F. G., Imanova, Z. B., Dzhamalova, Zh. S. (2016). Matematicheskie modeli kripto-kodovyh sredstv zashhity informacii na osnove TKS [Mathematic models of crypto code information protection means based on TCS]. Zashhita informacii. Kiev: NAU, 23, 24–26.
- Rzaev, H. N., Cyganenko, A. S. (2016). Analiz programmnoj realizacii metoda nedvoichnogo ravnovesnogo kodirovanija [Analysis of program realization method of non-binary equilibrium coding]. Azərbaycan Texniki Unuversiteti, Elmi Əsərlər Cild1, 1, 107–112.
- Hamdi, O. (2010). On the Usage of Chained Codes in Cryptography. International Journal of Computer Science and Security, 3 (6), 482–490. Available at: https://doaj.org/article/c0f40bdb1f6149f4ac107d44a95c9531
- Blejhut, R. (1986). Teorija i praktika kodov, kontrolirujushhih oshibki [Theory and practice of error-control codes]. Moscow: Mir, 576.
- Klark, Dzh.-ml.; Cybakov, B. S. (Ed.) (1987). Kodirovanie s ispravleniem oshibok v sistemah cifrovoj svjazi[Coding and error correction in digital communication systems]. Moscow: Radio i svjaz', 392.
- Mak-Vil'jams, F. Dzh., Slojen, N. Dzh. A. (1979). Teorija kodov, ispravljajushhih oshibki [Theory of error-correcting codes]. Moscow: Svjaz', 744.
- Muter, V. M. (1990). Osnovy pomehoustojchivoj teleperedachi informacii [Basics of anti-interferenceinformation teletransmiting]. Leningrad: Jenergoatomizdat. Leningr. otd-nie, 288.
- Kasami, T., Tokura, N., Ivadari, E., Inagaki, Ja.; Cybakov, B. S., Gel'fand, S. I. (Eds.) (1978). Teorija kodirovanija [Coding theory]. Moscow: Mir, 576.
- Kuznecov, O. O., Еvseеv, S. P., Kavun, S. V. (2008). Zahist іnformacіі ta ekonomіchna bezpeka pіdpriеmstva [Information protection and economic security of сompany]. Kharkov: Vid. HNEU, 360.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Serhii Yevseiev, Khazail Rzayev, Olga Korol, Zarіfa Imanova
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.