Abstract

The development of mobile technologies and computing resources has expanded the range of digital services and practically outstripped the development of computer technologies. This approach ensures the use of mobile and wireless networks in almost all areas of smart technologies, provides a further synthesis of cyberspace and the mobile Internet. However, the absence of security service protocols: confidentiality and integrity, initially when they are formed in the structure of LTE technologies, provides cyber attackers with the opportunity to use mobile Internet channels to implement targeted (APT) attacks. The development and emergence of a full-scale quantum computer with Shor and Grover algorithms can lead to a sharp decrease in the level of security of cryptosystems based on symmetric and asymmetric cryptography (including cryptography on elliptic curves). In addition, modern cyber threats have signs of synergy and hybridity, and their integration with social engineering methods practically does not allow providing the required level of preventive measures (protection). The article proposes post-quantum cryptosystems based on the Niederreiter crypto-code construction on low-density parity-check codes (LDPC-codes). This approach makes it easy to integrate into wireless networks based on IEEE 802.16 and IEEE 802.15.4 standards, as well as LTE mobile technologies. At the same time, the required level of resistance to modern threats ensured.

Highlights

  • The development of mobile technologies and wireless networks has determined the vectors for creating fundamentally new approaches to expanding the range of services based on wireless and mobile networks based on IEEE 802.16 and IEEE 802.15.4 technologies

  • The rapid development of quantum computing can significantly reduce the security of these cryptosystems based on the quantum algorithms of Shor and Grover [2,3,4,5,6], which requires the formation of new approaches to the creation and/or modification of known cryptosystems – the formation of post-quantum cryptography

  • The main difference and advantage of the Niederreiter code construction (CCC) in comparison to the McEliece CCC is the provision of the maximum coding rate, which can significantly affect its use in socio-cyber-physical systems (SCPS)

Read more

Summary

Introduction

The main difference and advantage of the Niederreiter CCC in comparison to the McEliece CCC is the provision of the maximum coding rate, which can significantly affect its use in socio-cyber-physical systems (SCPS). In the context of the development of socio-cyber-physical systems based on the 3GPP consortium [23] in the fifth generation 5G New Radio (NR) networks, LDPC – codes with a low density of parity checks – will be used as an error-correcting code. In [15], two approaches to the construction of McEliece's CCC on LDPC are considered, in terms of the relative coding rate, it is inferior to the Niederreiter CCC, which allows us to consider this CCC as the main one for providing security services in the SCPS. The purpose of the article is to form a mathematical model of the Niederreiter crypto-code construction on codes with a low density of parity checks

Statement of basic materials
LDPC dk
LDPCT dk
To restore the information equilibrium sequence
Entering the public key
LDPC m
Lossy text ciphertext
Conclusions
Список літератури
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call