Abstract
We develop mathematical models of modified crypto-code means of information protection based on the McEliece coding theory scheme using algebro-geometric block codes with shortening and extending of the information package, analyze the security and power costs of their software implementation.
Similar content being viewed by others
References
NISTIR 8105, Report on Post-Quantum Cryptography. https://doi.org/10.6028/NIST.IR.8105
Dinh, H., Moore, C., and Russell, A., McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks. https://dl.acm.org/citation.cfm?id=2033093
de Vries, S., Achieving 128-Bit Security against Quantum Attacks in OpenVPN, 2016, pp. 1–16. https://essay.utwente.nl/.../2016-08-09%20msc%20thesis%
Baldi, M., Bianchi, M., Chiaraluce, F., et al., Enhanced Public Key Security for the McEliece Cryptosystem. https://arxiv.org/abs/1108.2462
Rossi, M., Hamburg, M., Hutter, M., and Marson, M.E., A Side-Channel Assisted Cryptanalytic Attack Against QcBits. https://link.springer.com/chapter/10.1007/978-3-319-66787-41
Grischuk, R.V. and Danik, Yu.G., Osnovi kiberbezpeki (Fundamentals of Cybersecurity), Danik, Yu.G., Ed., Zhitomir: ZHNAEU, 2016.
Evseev, S., A Methodology for Security Evaluation of Information Technologies of Automated Banking Systems in Ukraine, Bezpeka Informatsiï, 2016, vol. 22, no. 3, pp. 297–309.
Zhang, G., Cai, S., Ma, C., and Zhang, D., Secure Error-Sorrecting (SEC) Schemes for Network Coding Through McEliece Cryptosystem. https://link.springer.com/article/10.1007/S10586-017-1294-5
Zhang, G., Cai, S., Ma, C., and Zhang, D., Universal Secure Error-Correcting (SEC) Schemes for Network Coding via McEliece Cryptosystem Based on QC-LDPC Codes. https://link.springer.com/article/10.1007/s10586-017-1354-x
Cho, J.Y., Griesser, H., and Rafique, D., A McEliece-Based Key Exchange Protocol for Optical Communication Systems. https://link.springer.com/chapter/10.1007%2f978-3-319-59265-78
Morozov, K., Roy, P.S., and Sakurai, K., On Unconditionally Binding Code-Based Commitment Schemes. https://dl.acm.org/citation.cfm?id=3022327&dl=ACM&coll=DL
Sidel’nikov, V.M., On an Encoding System Based on Generalized Reed-Solomon Codes, Diskret. Mat., 1992, vol. 4, no. 3, pp. 57–63.
Sidel’nikov, V.M., Cryptography and Coding Theory, Proc. of the Conf. “Moscow Univ. and the Development of Cryptography in Russia,” Moscow: Mosk. Gos. Univ., 2002, pp. 1–22.
Rzaev, Kh.N., Developing a Modified Asymmetric Crypto-Code McEliece System on Shortened Elliptic Codes, Vostochno-Evr. Zh. Peredovykh Tekhnol., 2016, vol. 4, no. 9 (82), pp. 18–26.
Rzaev, Kh.N. and Tsyganenko, A.S., Analysis of Software Implementation for the Method of Non-Binary Equilibrium Coding, Az erbaycan Texniki Universiteti, Elmi es erl er, 2016, vol. 1, no. 1, pp. 107–112, ISSN 1815-1779.
Blahut, R.E., Theory and Practice of Error Control Codes, Reading: Addison-Wesley, 1983. Translated under the title Teoriya i praktika kodov, kontroliruyushchikh oshibki, Moscow: Mir, 1986.
Clark, G.C., Jr. and Cain, J.B., Error-Correction Coding for Digital Communications, New York: Plenum, 1981. Translated under the title Kodirovanie s ispravleniem oshibok v sistemakh tsifrovoi svyazi, Moscow: Radio i Svyaz’, 1987.
McWilliams, F.J. and Sloan, N.J., The Theory of Error-correcting Codes, Amsterdam: North Holland, 1977. Translated under the title Teoriya kodov ispravlyayushchikh oshibki, Moscow: Svyaz’, 1979.
Muter, V.M., Osnovy pomekhoustoichivoi teleperedachi informatsii (Fundamentals of Fault-Tolerant Teletransmission of Information), Leningrad: Energoatomizdat, 1990.
Kasami, T., Tokura, N., Ivadari, E., and Inagaki, Ya., Teoriya kodirovaniya (Coding Theory). Translated from Japanese, Tsybakov, B.S. and Gel’fand, S.I., Eds., Moscow: Mir, 1978.
Author information
Authors and Affiliations
Corresponding author
Additional information
This paper was recommended for publication by O.N. Granichin, a member of the Editorial Board
Rights and permissions
About this article
Cite this article
Rzaev, K.N. Mathematical Models of Modified Crypto-Code Means of Information Protection Based on Coding Theory Schemes. Autom Remote Control 80, 1304–1316 (2019). https://doi.org/10.1134/S0005117919070087
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1134/S0005117919070087