Abstract

Research of criteria of modified non-symmetric crypto-code construction of McEliece on extended elliptic codes

Highlights

  • The rapid growth of the volume of data being processed and the development of computing technology has put forward new requirements for reliability and data security

  • Through the imminent emergence of new schemes, sufficient attention has not been paid to the well-known, asymmetric crypto-code systems (ACCS) based on McEliece theoretical code schemes (TCS), which are quantum-stable

  • In a result of conducted research it can be concluded that: 1. Evaluation by NIST specialists of the computing capabilities of quantum computers requires a review of the use of traditional encryption algorithms to provide basic security services based on symmetric and asymmetric cryptography

Read more

Summary

Introduction

The rapid growth of the volume of data being processed and the development of computing technology has put forward new requirements for reliability and data security. The main research and development of cryptographic information security tools (CIST) are currently aimed at finding solutions that confront quantum computing and at the same time must be resistant to attacks using ordinary computers. Such algorithms are related to the section of quantum-resistant cryptography (quantum secure cryptography or quantum resistant cryptography) [3–4]. Through the imminent emergence of new schemes, sufficient attention has not been paid to the well-known, asymmetric crypto-code systems (ACCS) based on McEliece theoretical code schemes (TCS), which are quantum-stable

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.