Skip to main content
Log in

Mathematical Models of Modified Crypto-Code Means of Information Protection Based on Coding Theory Schemes

  • Optimization, System Analysis, and Operations Research
  • Published:
Automation and Remote Control Aims and scope Submit manuscript

Abstract

We develop mathematical models of modified crypto-code means of information protection based on the McEliece coding theory scheme using algebro-geometric block codes with shortening and extending of the information package, analyze the security and power costs of their software implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. NISTIR 8105, Report on Post-Quantum Cryptography. https://doi.org/10.6028/NIST.IR.8105

  2. Dinh, H., Moore, C., and Russell, A., McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks. https://dl.acm.org/citation.cfm?id=2033093

  3. de Vries, S., Achieving 128-Bit Security against Quantum Attacks in OpenVPN, 2016, pp. 1–16. https://essay.utwente.nl/.../2016-08-09%20msc%20thesis%

    Google Scholar 

  4. Baldi, M., Bianchi, M., Chiaraluce, F., et al., Enhanced Public Key Security for the McEliece Cryptosystem. https://arxiv.org/abs/1108.2462

  5. Rossi, M., Hamburg, M., Hutter, M., and Marson, M.E., A Side-Channel Assisted Cryptanalytic Attack Against QcBits. https://link.springer.com/chapter/10.1007/978-3-319-66787-41

  6. Grischuk, R.V. and Danik, Yu.G., Osnovi kiberbezpeki (Fundamentals of Cybersecurity), Danik, Yu.G., Ed., Zhitomir: ZHNAEU, 2016.

  7. Evseev, S., A Methodology for Security Evaluation of Information Technologies of Automated Banking Systems in Ukraine, Bezpeka Informatsiï, 2016, vol. 22, no. 3, pp. 297–309.

    MathSciNet  Google Scholar 

  8. Zhang, G., Cai, S., Ma, C., and Zhang, D., Secure Error-Sorrecting (SEC) Schemes for Network Coding Through McEliece Cryptosystem. https://link.springer.com/article/10.1007/S10586-017-1294-5

  9. Zhang, G., Cai, S., Ma, C., and Zhang, D., Universal Secure Error-Correcting (SEC) Schemes for Network Coding via McEliece Cryptosystem Based on QC-LDPC Codes. https://link.springer.com/article/10.1007/s10586-017-1354-x

  10. Cho, J.Y., Griesser, H., and Rafique, D., A McEliece-Based Key Exchange Protocol for Optical Communication Systems. https://link.springer.com/chapter/10.1007%2f978-3-319-59265-78

  11. Morozov, K., Roy, P.S., and Sakurai, K., On Unconditionally Binding Code-Based Commitment Schemes. https://dl.acm.org/citation.cfm?id=3022327&dl=ACM&coll=DL

  12. Sidel’nikov, V.M., On an Encoding System Based on Generalized Reed-Solomon Codes, Diskret. Mat., 1992, vol. 4, no. 3, pp. 57–63.

    Google Scholar 

  13. Sidel’nikov, V.M., Cryptography and Coding Theory, Proc. of the Conf. “Moscow Univ. and the Development of Cryptography in Russia,” Moscow: Mosk. Gos. Univ., 2002, pp. 1–22.

    Google Scholar 

  14. Rzaev, Kh.N., Developing a Modified Asymmetric Crypto-Code McEliece System on Shortened Elliptic Codes, Vostochno-Evr. Zh. Peredovykh Tekhnol., 2016, vol. 4, no. 9 (82), pp. 18–26.

    Google Scholar 

  15. Rzaev, Kh.N. and Tsyganenko, A.S., Analysis of Software Implementation for the Method of Non-Binary Equilibrium Coding, Az erbaycan Texniki Universiteti, Elmi es erl er, 2016, vol. 1, no. 1, pp. 107–112, ISSN 1815-1779.

    Google Scholar 

  16. Blahut, R.E., Theory and Practice of Error Control Codes, Reading: Addison-Wesley, 1983. Translated under the title Teoriya i praktika kodov, kontroliruyushchikh oshibki, Moscow: Mir, 1986.

    MATH  Google Scholar 

  17. Clark, G.C., Jr. and Cain, J.B., Error-Correction Coding for Digital Communications, New York: Plenum, 1981. Translated under the title Kodirovanie s ispravleniem oshibok v sistemakh tsifrovoi svyazi, Moscow: Radio i Svyaz’, 1987.

    Book  MATH  Google Scholar 

  18. McWilliams, F.J. and Sloan, N.J., The Theory of Error-correcting Codes, Amsterdam: North Holland, 1977. Translated under the title Teoriya kodov ispravlyayushchikh oshibki, Moscow: Svyaz’, 1979.

    Google Scholar 

  19. Muter, V.M., Osnovy pomekhoustoichivoi teleperedachi informatsii (Fundamentals of Fault-Tolerant Teletransmission of Information), Leningrad: Energoatomizdat, 1990.

    Google Scholar 

  20. Kasami, T., Tokura, N., Ivadari, E., and Inagaki, Ya., Teoriya kodirovaniya (Coding Theory). Translated from Japanese, Tsybakov, B.S. and Gel’fand, S.I., Eds., Moscow: Mir, 1978.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kh. N. Rzaev.

Additional information

This paper was recommended for publication by O.N. Granichin, a member of the Editorial Board

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rzaev, K.N. Mathematical Models of Modified Crypto-Code Means of Information Protection Based on Coding Theory Schemes. Autom Remote Control 80, 1304–1316 (2019). https://doi.org/10.1134/S0005117919070087

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0005117919070087

Keywords

Navigation