Abstract

The article analyzes construction of crypto-code designs (CCDs) on the basis of asymmetric Mac-Alice and Niederreiter crypto-code systems on elliptical (EC) and modified elliptic codes (MEC), which, in the conditions of post-quantum cryptography, allow to provide a guaranteed level of crypto stability, to counteract the modern Attacks and attack by V. Sidelnikov on the theoretical code schemes of McAlias and Niederreiter. Schemes of hybrid crypto-code designs constraction the lossy codes are addressed. Methods of constructing mechanisms of confidentiality and integrity of banking information resources under hybrid threats to security components (information security, cybersecurity, information security) are proposed. Using of a lossy code is suggested to this end. Lossy Code allow you to increase the speed of code changes by reducing the power of the field when causing damage to open text and reducing the amount of data transferred by causing harm to the cipher text. The methods of constructing unprofitable codes and approaches for use in hybrid KKK of McAlias and Niederreiter on modified elliptic codes are considered. Practical algorithms for the use of the MV2 mechanism in McAlias’ CCD and Niederreiter’s modified elliptic codes are proposed, which allows the implementation of the CCD hybrid scheme. The comparative results of the study of stability and power capacity with respect to their practical use in automated banking systems are presented.

Highlights

  • The age of high technology is characterized by the sharp increase in the volume of processed data, quantum technologies and artificial intelligence development in all spheres of human activity, the emergence of hybrid threats in cyberspace and the reduction of the stability of classical algorithms of traditional and asymmetric cryptography

  • Results of researches of practical realization MCCS on modified elliptic codes (MEC) confirm that the number of group operations has been reduced by 4.5 times due to the construction of the GF []

  • The proposed CCS provide the security of information resources, authenticity of data transmission (Рпом

Read more

Summary

Introduction

The age of high technology is characterized by the sharp increase in the volume of processed data, quantum technologies and artificial intelligence development in all spheres of human activity, the emergence of hybrid threats in cyberspace and the reduction of the stability of classical algorithms of traditional and asymmetric cryptography. Cryptographic systems on asymmetric cryptography algorithms (RSA, ECC, DSA) will be vulnerable to brute force attacks using a full-scale quantum computer. The main research and development of cryptographic information security (KPI) is aimed at finding solutions that would not be vulnerable to quantum computing and would be simultaneously resistant to attacks using conventional computers. Such algorithms refer to the section of quantum-safe cryptography (or quantum-resistant cryptography) (De Vries, 2016; Hryshchuk & Molodetska-Hrynhchuk, 2018; Hryshchuk & Molodetska, 2016; Kuchuk et al, 2016; Kuchuk et al, 2017; Mozhaev et al, 2017), among which NIST specialists distinguish cipher-code systems of Mac-Alice and Niederreiter. Sidelnikov, the perspective direction is the use of algebra-geometric (built using curves, for example, elliptic, Fermat, Suzuki, Hermite, etc.) or cascading codes (Baldi et al, 2016; Cho et al, 2017; Dudikevich et al, 2010; Morozov et al, 2017; Sidelnikov, 2008)

Methods
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call