Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes

Authors

  • Serhii Yevseiev Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166, Ukraine
  • Khazail Rzayev Azerbaijan State University of Oil and Industry Azadlyg ave., 20, Baku, Azerbaijan, AZ1010, Azerbaijan
  • Olga Korol Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166, Ukraine
  • Zarіfa Imanova Azerbaijan State University of Oil and Industry Azadlyg ave., 20, Baku, Azerbaijan, AZ1010, Azerbaijan

DOI:

https://doi.org/10.15587/1729-4061.2016.75250

Keywords:

asymmetric crypto-code system, theoretical-code scheme, modified error-correcting codes

Abstract

Symmetric and asymmetric cryptographic algorithms, providing the required level of cryptographic strength are generally used to ensure security in modern communication systems, and error-correcting coding techniques - to ensure reliability. The use of asymmetric crypto-code systems enables integrated (with one mechanism) provision of the required levels of reliability, security and efficiency in the processing and transmission of confidential information via open channels of telecommunication systems. The research confirms that their usage provides high performance on the level of symmetric encryption algorithms with BSSH, provable cryptographic strength based on theoretical and complexity problems in arbitrary code decoding (1030 – 1035 group operations are provided), and reliability through the use of a shortened algebra-geometric code (Рош10-9 – 10-12 is provided). A major disadvantage of the use of the McEliece cryptographic system are large amounts of critical data (to provide the required cryptographic strength it is necessary to build a system in the GF (210 –213). In order to reduce the volume of key data (public key), we propose to use shortened codes, that enables to reduce the GF(26 –28), while maintaining a cryptographic strength level, by introducing the character location entropy at initialization vector.

Author Biographies

Serhii Yevseiev, Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166

PhD, Associate Professor, Senior Researcher

Information Systems Department

Khazail Rzayev, Azerbaijan State University of Oil and Industry Azadlyg ave., 20, Baku, Azerbaijan, AZ1010

PhD, Associate Professor

Department of Computer Technology and Programming

Olga Korol, Simon Kuznets Kharkiv National University of Economics Nauky ave., 9-А, Kharkiv, Ukraine, 61166

PhD, Associate Professor

Information Systems Department

Zarіfa Imanova, Azerbaijan State University of Oil and Industry Azadlyg ave., 20, Baku, Azerbaijan, AZ1010

Assistant

Department of Computer Technology and Programming

References

  1. Semenov, S. G., Smirnov, A. A., Meleshko, E. V. (2011). Modeli i metody upravleniya setevymi resursami v informatsionno-telekommunikatsionnykh sistemakh [Models and methods of network resource management in information and telecommunication systems]. Kharkov: NTU "KhPI", 212.
  2. Rzaev, H. N., Korol', O. G.; Ponomarenko, V. S. (Ed.) (2016) Analiz sostojanija i putej sovershenstvovanija protokolov bezopasnosti sovremennyh telekommunikacionnyh setej. Informacionnye tehnologii v upravlenii, obrazovanii, nauke i promyshlennosti. Kharkov: Izdatel' Rozhko S. G., 217–234.
  3. Telekommunikacionnye uslugi v mirovoj jekonomike [Telecommunication services in national economics]. Available at: http://www.gumer.info/bibliotek_Buks/Econom/world_econom/30.php
  4. Korol', O. G. (2012). Protokoly bezopasnosti telekommunikacionnyh setej [Protocols of telecommunication network security]. Sistemi obrobki іnformacіі, 6 (104), 113–120.
  5. Ojha, D. B., Sharma, A., Dwivedi, A., Kumar, B., Kumar, A. (2011). Transmission of Picturesque content with Code Base Cryptosystem. International Journal of Computer Technology and Applications, 02 (01), 127–131. Available at: https://doaj.org/article/6714b60516cc4aa79e56d0c421febaf3
  6. Salman, A. G. (2014). Steganography application program using the ID3v2 in the MP3 audio file on mobile phone. Journal of Computer Science, 10 (7), 1249–1252. doi: 10.3844/jcssp.2014.1249.1252
  7. Ojha, D. B., Sharma, A., Pandey, A. D. N., Kumar, A. (2010). Space-Age Approach To Transmit Medical Image With Codebase Cryptosystem Over Noisy Channel. International Journal of Engineering Science and Technology, 2 (12), 7112–7117. Available at: https://doaj.org/article/5c7da3a1e3ec4f83b552199034bd3241
  8. Ojha, D. B., Sharma, A. (2011). An Authenticated Transmission of Medical Image with Codebase Cryptosystem over Noisy Channel. International Journal of Advanced Networking and Applications, 2 (5), 841–845. Available at: https://doaj.org/article/39a3ac65d5b24b348f069dfc82eb6248
  9. Jeeva, Y. C. (2013). A Novel Approach For Information Security In Ad Hoc Networks Through Secure Key Management. Journal of Computer Science, 9 (11), 1556–1565. Available at: https://doaj.org/article/378b88837cdf4cab9f8010a38a6aeb2b
  10. McEliece, R. J. (1978). A Public-Key Criptosystem Based on Algebraic Theory. DGN Progres Report 42-44. Pasadena, C.A., 114–116.
  11. Niederreiter, H. (1986). Knapsack-Type Cryptosystems and Algebraic Coding Theory. Problems of Control and Information Theory, 15 (2), 159–166.
  12. Sidel'nikov, V. M. (2002). Kriptografija i teorija kodirovanija [Cryptography and coding theory]. Moskovskij universitet i razvitie kriptografii v Rossii. Moscow, 22.
  13. Evseev, S. P., Tomashevskij, B. P. (2011). Issledovanie teoretiko-kodovyh shem dlja kompleksnogo obespechenija bezopasnosti i dostovernosti dannyh v informacionnyh sistemah [Theoretic code scheme research for providing overall security and authenticity of data in information systems]. Naukovij vіsnik Chernіvec'kogo unіversitetu. Serіja: Komp’juternі sistemi ta komponenti, 2 (1), 6–14.
  14. Rzaev, H. N., Iskenderzade, G. G., Samedov, F. G., Imanova, Z. B., Dzhamalova, Zh. S. (2016). Matematicheskie modeli kripto-kodovyh sredstv zashhity informacii na osnove TKS [Mathematic models of crypto code information protection means based on TCS]. Zashhita informacii. Kiev: NAU, 23, 24–26.
  15. Rzaev, H. N., Cyganenko, A. S. (2016). Analiz programmnoj realizacii metoda nedvoichnogo ravnovesnogo kodirovanija [Analysis of program realization method of non-binary equilibrium coding]. Azərbaycan Texniki Unuversiteti, Elmi Əsərlər Cild1, 1, 107–112.
  16. Hamdi, O. (2010). On the Usage of Chained Codes in Cryptography. International Journal of Computer Science and Security, 3 (6), 482–490. Available at: https://doaj.org/article/c0f40bdb1f6149f4ac107d44a95c9531
  17. Blejhut, R. (1986). Teorija i praktika kodov, kontrolirujushhih oshibki [Theory and practice of error-control codes]. Moscow: Mir, 576.
  18. Klark, Dzh.-ml.; Cybakov, B. S. (Ed.) (1987). Kodirovanie s ispravleniem oshibok v sistemah cifrovoj svjazi[Coding and error correction in digital communication systems]. Moscow: Radio i svjaz', 392.
  19. Mak-Vil'jams, F. Dzh., Slojen, N. Dzh. A. (1979). Teorija kodov, ispravljajushhih oshibki [Theory of error-correcting codes]. Moscow: Svjaz', 744.
  20. Muter, V. M. (1990). Osnovy pomehoustojchivoj teleperedachi informacii [Basics of anti-interferenceinformation teletransmiting]. Leningrad: Jenergoatomizdat. Leningr. otd-nie, 288.
  21. Kasami, T., Tokura, N., Ivadari, E., Inagaki, Ja.; Cybakov, B. S., Gel'fand, S. I. (Eds.) (1978). Teorija kodirovanija [Coding theory]. Moscow: Mir, 576.
  22. Kuznecov, O. O., Еvseеv, S. P., Kavun, S. V. (2008). Zahist іnformacіі ta ekonomіchna bezpeka pіdpriеmstva [Information protection and economic security of сompany]. Kharkov: Vid. HNEU, 360.

Downloads

Published

2016-08-31

How to Cite

Yevseiev, S., Rzayev, K., Korol, O., & Imanova, Z. (2016). Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes. Eastern-European Journal of Enterprise Technologies, 4(9(82), 18–26. https://doi.org/10.15587/1729-4061.2016.75250

Issue

Section

Information and controlling system