Practical implementation of the Niederreiter modified cryptocode system on truncated elliptic codes
Journal Title: Восточно-Европейский журнал передовых технологий - Year 2018, Vol 6, Issue 4
Abstract
On the basis of the practical implementation of the classic Niederreiter scheme for non-binary codes, a pattern has been identified for practical implementation –fixing the admissible position vectors of the plaintext transformation based on equilibrium coding. The obtained set of position vectors of the error vector with a fixed set of masking matrices (the recipient's private key) allows us to obtain the algorithm for decoding the classical Niederreiter crypto-code scheme on non-binary codes. For this, a modification of the crypto-code system (CCS) is necessary. It is proposed to use the additional parameter of key data – the initialization vector (the set of invalid position vectors of the error vector). To counter the Sidelnikov attacks, it is proposed to use modified (shortened) algebraic-geometric (elliptic) codes (MEC). For this, it is necessary to use the second additional initialization vector (the set of positions for shortening the error vector). Based on the modification of the classical Niederreiter scheme on non-binary codes, applied algorithms for generating and decrypting a cryptogram in the Niederreiter modified crypto-code system based on modified (shortened) elliptic codes and software are proposed. To confirm the profitability of the proposed crypto-code system, the results of the comparative evaluation of energy consumption for the implementation of the classical Niederreiter scheme on elliptic codes and the implementation of the proposed system on modified elliptic codes are presented. The results confirm the possibility of practical implementation of the Niederreiter crypto-code system based on the proposed algorithms. At the same time, the required level of cryptographic strength of the crypto-code system, protection of the cryptosystem against the Sidelnikov attacks and an increase in the rate of cryptographic transformations by 3-5 times compared with the classical Niederreiter scheme are guaranteed
Authors and Affiliations
Serhii Yevseiev, Oleksii Tsyhanenko, Volodymyr Aleksiyev, Dmytrо Verheles, Sergey Volkov, Roman Korolev, Hryhorii Kots, Oleksandr Milov, Olexander Shmatko
Theoretical and applied aspects of using a thermal pump effect in gas pipeline systems
<p class="a">Based on the classical method for calculating parameters of gas pipelines using electrohydraulic analogy, a mathematical model of the object, the process of gas transmission in an industrial pipeline, has be...
Estimation model of the diesel engine fuel system with an electromechanical device to intensify fuel supply
<p>The key directions of the development and improvement of the fuel supply system for internal combustion engines with ignition from compression of the fuel/air mixture were pointed out. The need for the comprehensive i...
Development of the method of frequencytemporal representation of fluctuations of gaseous medium parameters at fire
<p>The method of operative frequency-temporal representation of fluctuations of gaseous media parameters at an early stage of fire at premises was developed. The basic assumptions about the peculiarities of dynamics of h...
Development of the Markovian model for the life cycle of a project’s benefits
<p>This study has improved the standard P5 (Personnel, planet, profit, process, product), which has already been widely applied globally in the practice of project management. However, the standard P5 provides a scheme o...
Analysis of the influence of drydock main pumps drive on electric network
<p>The influence of unadjustable-speed AC drive and adjustable-speed DC drive of the drydock main pumps on the network of the Okean shipyard (Ukraine) is investigated in MatLab SimPowerSystems.</p><p>To accurately simula...