Modifications of niederreiter crypto-code construction
DOI:
https://doi.org/10.15587/2313-8416.2019.189621Keywords:
Niederreiter modified crypto-code construction, modified shortened elliptic codes, equilibrium coding, informational secrecyAbstract
Studies of the Niederreiter crypto-code construction at MES have revealed the main reason for the impossibility of practical implementation of decoding algorithms with non-binary codes in the classical scheme. It has been established that fixing a subset of plaintexts is required, for which the error localization procedure cannot be performed with masking selected private matrices X, P, and D. The modified algorithm is developed by shortening the source data and fixing the allowable positional plaintext transformation vectors based on equilibrium coding
References
Dinh, H., Moore, C., Russell, A. (2019). McEliece and Niederreiter Cryptosystems that Resist Quantum Fourier Sampling Attacks. Heidelberg: Springer-Verlag Berlin, 761–779. Available at: https://dl.acm.org/citation.cfm?id=2033093 Last accessed: 01.12.2019
Sidelnikov, V. M. (2008). Teoriia kodirovaniia. Moscow: FIZMATLIT, 324.
Yevseiev, S., Tsyhanenko, O., Ivanchenko, S., Aleksiyev, V., Verheles, D., Volkov, S. et. al. (2018). Practical implementation of the Niederreiter modified cryptocode system on truncated elliptic codes. Eastern-European Journal of Enterprise Technologies, 6 (4 (96)), 24–31. doi: http://doi.org/10.15587/1729-4061.2018.150903
Cho, J. Y., Griesser, H., Rafique, D. (2017). A McEliece-Based Key Exchange Protocol for Optical Communication Systems. Lecture Notes in Electrical Engineering, 109–123. doi: http://doi.org/10.1007/978-3-319-59265-7_8
Yevseiev, S., Rzayev, K., Korol, O., Imanova, Z. (2016). Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (82)), 18–26. doi: http://doi.org/10.15587/1729-4061.2016.75250
Yevseiev, S., Tsyhanenko, O. (2018). Development of asymmetrical crypto-coded construction of niderraiter on modified codes. Sistemi obrobki іnformacіi, 2 (153), 127–135. doi: http://doi.org/10.30748/soi.2018.153.16
Dudykevych, V. B., Kuznetsov, O. O., Tomashevskyi, B. P. (2010). Krypto-kodovyi zakhyst informatsii z nedviikovym rivnovahovym koduvanniam. Suchasnyi zakhyst informatsii, 2, 14–23.
Dudykevych, V. B., Kuznietsov, O. O., Tomashevskyi, B. P. (2010). Metod nedviikovoho rivnovahovoho koduvannia. Suchasnyi zakhyst informatsii, 3, 57–68.
De Vries, S. (2016). Achieving 128-bit Security againstQuantum Attacks in OpenVPN. Available at: https://internetscriptieprijs.nl/wp-content/uploads/2017/04/1-Simon-de-Vries-UT.pdf Last accessed: 01.12.2019
Baldi, M., Bianchi, M., Chiaraluce, F., Rosenthal, J., Schipani, D. (2014). Enhanced public key security for the McEliece cryptosystem. Available at: https://arxiv.org/abs/1108.2462 Last accessed: 01.12.2019
Yevseiev, S., Tsyhanenko, O., Gavrilova, A., Guzhva, V., Milov, O., Moskalenko, V. et. al. (2019). Development of Niederreiter hybrid crypto-code structure on flawed codes. Eastern-European Journal of Enterprise Technologies, 1 (9 (97)), 27–38. doi: http://doi.org/10.15587/1729-4061.2019.156620
Yevseiev, S., Shmatko, O., Tsyhanenko, O. (2019). Metodologicheskiye osnovy postroyeniya kriptostoykikh kriptosistem Mak-Elisa i Niderraytera na algebrogeometricheskikh kodakh v postkvantovoy kriptografii. 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies. Ankara.
Downloads
Published
Issue
Section
License
Copyright (c) 2019 Oleksii Tsyhanenko
This work is licensed under a Creative Commons Attribution 4.0 International License.
Our journal abides by the Creative Commons CC BY copyright rights and permissions for open access journals.
Authors, who are published in this journal, agree to the following conditions:
1. The authors reserve the right to authorship of the work and pass the first publication right of this work to the journal under the terms of a Creative Commons CC BY, which allows others to freely distribute the published research with the obligatory reference to the authors of the original work and the first publication of the work in this journal.
2. The authors have the right to conclude separate supplement agreements that relate to non-exclusive work distribution in the form in which it has been published by the journal (for example, to upload the work to the online storage of the journal or publish it as part of a monograph), provided that the reference to the first publication of the work in this journal is included.