Abstract
Research of criteria of modified non-symmetric crypto-code construction of McEliece on extended elliptic codes
Highlights
The rapid growth of the volume of data being processed and the development of computing technology has put forward new requirements for reliability and data security
Through the imminent emergence of new schemes, sufficient attention has not been paid to the well-known, asymmetric crypto-code systems (ACCS) based on McEliece theoretical code schemes (TCS), which are quantum-stable
In a result of conducted research it can be concluded that: 1. Evaluation by NIST specialists of the computing capabilities of quantum computers requires a review of the use of traditional encryption algorithms to provide basic security services based on symmetric and asymmetric cryptography
Summary
The rapid growth of the volume of data being processed and the development of computing technology has put forward new requirements for reliability and data security. The main research and development of cryptographic information security tools (CIST) are currently aimed at finding solutions that confront quantum computing and at the same time must be resistant to attacks using ordinary computers. Such algorithms are related to the section of quantum-resistant cryptography (quantum secure cryptography or quantum resistant cryptography) [3–4]. Through the imminent emergence of new schemes, sufficient attention has not been paid to the well-known, asymmetric crypto-code systems (ACCS) based on McEliece theoretical code schemes (TCS), which are quantum-stable
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Наука і техніка Повітряних Сил Збройних Сил України
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.