Development of post-quantum cryptosystems based on the Rao-Nam scheme ; Розробка постквантових криптосистем на основі схеми Рао-Нама

Saved in:
Bibliographic Details
Title: Development of post-quantum cryptosystems based on the Rao-Nam scheme ; Розробка постквантових криптосистем на основі схеми Рао-Нама
Authors: Меленті, Євген Олександрович, Король, Ольга Григорівна, Шульга, Володимир Петрович, Мілевський, Станіслав Валерійович, Сєвєрінов, Олександр Васильович, Войтко, Олександр Володимирович, Rzayev, Khazail, Гусарова, Ірина Григоріївна, Кравченко, Сергій Опанасович, Pashayeva, Sevinj
Source: Eastern-European Journal of Enterprise Technologies; Vol. 1 No. 9 (133) (2025): Information and controlling system; 35-48 ; Eastern-European Journal of Enterprise Technologies; Том 1 № 9 (133) (2025): Інформаційно-керуючі системи; 35-48 ; 1729-4061 ; 1729-3774
Publisher Information: TECHNOLOGY CENTER PC®
Publication Year: 2025
Collection: Scientific Periodicals of Ukraine (Ukrainian Research and Academic Network) / Наукова періодика України
Subject Terms: крипто-кодові конструкції Рао-Нама, алгебраїчні коди, інтелектуальні системи захисту, Rao-Nam crypto-code constructions, algebraic codes, intelligent protection systems
Description: The object of the research is the process of ensuring the protection of data transmission in communication channels of critical infrastructure objects based on mobile and smart technologies. The development of quantum computing technologies based on Grover and Shor algorithms provides practical cracking of symmetric and asymmetric cryptosystems in polynomial time. The emergence of systems based on artificial intelligence allows creating hybrid systems for detecting weaknesses (critical points) in security systems not only on critical infrastructure objects. In addition, a full-scale quantum computer will open a new era of implementing post-quantum cryptography algorithms. Among the winners of post-quantum algorithms, the crypto-code constructions (CCC) of McEliece and Niederreiter are separately highlighted, which allow to provide the required level of protection and the required level of reliability of information transmission in an integrated manner. But a significant drawback is the possibility of cracking such systems on linear codes, as well as the need to build them on the Galois field 210–213, which significantly reduces their use in low-capacity systems based on smart and mobile technologies. To solve this drawback, the work proposes the use of a symmetric CCC based on the Rao-Nam scheme on algebrogeometric and flawed codes, which provides the possibility of significantly reducing the volume of key data (construction of CCC over the Galois field 24–26). When using the Rao-Nam CCC, a quantum symmetric algorithm is formed, which ensures the preservation of the level of stability and reliability of information transmission (safe time 1025–1035). This approach provides the possibility of forming intelligent information protection systems (IIPS). The given structural scheme of the IIPS construction ensures timely detection of threats with an assessment of the computational and financial and human capabilities of attackers, as well as the use of the necessary CCC/algebraic (flawed) codes to ensure the required ...
Document Type: article in journal/newspaper
File Description: application/pdf
Language: English
Relation: https://journals.uran.ua/eejet/article/view/323195/314211; https://journals.uran.ua/eejet/article/view/323195
Availability: https://journals.uran.ua/eejet/article/view/323195
Rights: Авторське право (c) 2025 Yevhen Melenti, Olha Korol, Volodymyr Shulha, Stanislav Milevskyi, Оleksandr Sievierinov, Oleksandr Voitko, Khazail Rzayev, Iryna Husarova, Serhii Kravchenko, Sevinj Pashayeva ; http://creativecommons.org/licenses/by/4.0
Accession Number: edsbas.33D45F23
Database: BASE
Description
Abstract:The object of the research is the process of ensuring the protection of data transmission in communication channels of critical infrastructure objects based on mobile and smart technologies. The development of quantum computing technologies based on Grover and Shor algorithms provides practical cracking of symmetric and asymmetric cryptosystems in polynomial time. The emergence of systems based on artificial intelligence allows creating hybrid systems for detecting weaknesses (critical points) in security systems not only on critical infrastructure objects. In addition, a full-scale quantum computer will open a new era of implementing post-quantum cryptography algorithms. Among the winners of post-quantum algorithms, the crypto-code constructions (CCC) of McEliece and Niederreiter are separately highlighted, which allow to provide the required level of protection and the required level of reliability of information transmission in an integrated manner. But a significant drawback is the possibility of cracking such systems on linear codes, as well as the need to build them on the Galois field 210–213, which significantly reduces their use in low-capacity systems based on smart and mobile technologies. To solve this drawback, the work proposes the use of a symmetric CCC based on the Rao-Nam scheme on algebrogeometric and flawed codes, which provides the possibility of significantly reducing the volume of key data (construction of CCC over the Galois field 24–26). When using the Rao-Nam CCC, a quantum symmetric algorithm is formed, which ensures the preservation of the level of stability and reliability of information transmission (safe time 1025–1035). This approach provides the possibility of forming intelligent information protection systems (IIPS). The given structural scheme of the IIPS construction ensures timely detection of threats with an assessment of the computational and financial and human capabilities of attackers, as well as the use of the necessary CCC/algebraic (flawed) codes to ensure the required ...