DEVELOPMENT OF CRYPTOCODE CONSTRUCTIONS BASED ON ALGEBRAIC, LDPC, AND DAMAGE CODES ; РОЗРОБКА КРИПТО-КОДОВИХ КОНСТРУКЦІЙ НА ОСНОВІ АЛГЕБРАЇЧНИХ ТА LDPC, ЗБИТКОВИХ КОДАХ

Uloženo v:
Podrobná bibliografie
Název: DEVELOPMENT OF CRYPTOCODE CONSTRUCTIONS BASED ON ALGEBRAIC, LDPC, AND DAMAGE CODES ; РОЗРОБКА КРИПТО-КОДОВИХ КОНСТРУКЦІЙ НА ОСНОВІ АЛГЕБРАЇЧНИХ ТА LDPC, ЗБИТКОВИХ КОДАХ
Autoři: Дунаєв, Сергій
Zdroj: Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»; Vol. 3 No. 31 (2025): Cybersecurity: Education, Science, Technique; 663-678 ; Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка»; Том 3 № 31 (2025): Кібербезпека: освіта, наука, техніка; 663-678 ; 2663-4023 ; 10.28925/2663-4023.2025.31
Informace o vydavateli: Education, Science, Technique
Rok vydání: 2025
Sbírka: Cybersecurity: Education, Science, Technique (E-Journal) / Кібербезпека: освіта, наука, техніка
Témata: крипто-кодові конструкції Рао-Нама, алгебраїчні коди, LDPC та збиткові коди, Rao-Nam crypto-code constructions, algebraic codes, LDPC, and defective codes
Popis: The development of post-quantum technologies calls into question the cryptographic strength of modern symmetric and asymmetric cryptosystems. With the advent of a full-scale quantum computer, such systems will not be able to provide the required level of cryptographic strength (level 5 according to the US NIST scale). The competition of post-quantum algorithms has revealed a tendency towards the construction of cryptosystems based on the synthesis (integration) of security theories with Galois theory. Among the winners of post-quantum algorithms are the crypto-code constructions (CCC) of McEliece and Niederreiter, which make it possible to comprehensively provide the necessary level of protection and increase the level of probability of information transfer. But a significant drawback is the possibility of hacking such systems using linear codes, as well as the need to build them on the Galois field 210–213, which significantly reduces their ability to build systems based on intelligent technologies and mesh networks. The work proposes the use of symmetric CCC (SCCC) based on the Rao-Nama scheme (SCCC R-N) on MEC (modified elliptic codes), LDPC, and damage codes, which makes it possible to significantly reduce the volume of key data (constructing CCC using the Galois field 24–26) while maintaining the level of cryptographic strength of the probability of information transmission (the safe time is equal to the execution time of 1025–1035 elementary group operations). This approach makes it possible to create intelligent information security systems (ISPS). The purpose of the research is to develop post-quantum algorithms based on the integration of theories for constructing cryptosystems of symmetric and asymmetric cryptography with methods for constructing error-resistant codes. This approach allows you to regulate the required level of stability of the cryptosystems based on the requirements for the secrecy of the information message, as well as the time it is stored, and the level of stability of the system as ...
Druh dokumentu: article in journal/newspaper
Popis souboru: application/pdf
Jazyk: Ukrainian
Relation: https://csecurity.kubg.edu.ua/index.php/journal/article/view/1061/890; https://csecurity.kubg.edu.ua/index.php/journal/article/view/1061
DOI: 10.28925/2663-4023.2025.31.1061
Dostupnost: https://csecurity.kubg.edu.ua/index.php/journal/article/view/1061
https://doi.org/10.28925/2663-4023.2025.31.1061
Rights: Авторське право (c) 2025 Сергій Дунаєв ; https://creativecommons.org/licenses/by-nc-sa/4.0
Přístupové číslo: edsbas.FC144D17
Databáze: BASE
Popis
Abstrakt:The development of post-quantum technologies calls into question the cryptographic strength of modern symmetric and asymmetric cryptosystems. With the advent of a full-scale quantum computer, such systems will not be able to provide the required level of cryptographic strength (level 5 according to the US NIST scale). The competition of post-quantum algorithms has revealed a tendency towards the construction of cryptosystems based on the synthesis (integration) of security theories with Galois theory. Among the winners of post-quantum algorithms are the crypto-code constructions (CCC) of McEliece and Niederreiter, which make it possible to comprehensively provide the necessary level of protection and increase the level of probability of information transfer. But a significant drawback is the possibility of hacking such systems using linear codes, as well as the need to build them on the Galois field 210–213, which significantly reduces their ability to build systems based on intelligent technologies and mesh networks. The work proposes the use of symmetric CCC (SCCC) based on the Rao-Nama scheme (SCCC R-N) on MEC (modified elliptic codes), LDPC, and damage codes, which makes it possible to significantly reduce the volume of key data (constructing CCC using the Galois field 24–26) while maintaining the level of cryptographic strength of the probability of information transmission (the safe time is equal to the execution time of 1025–1035 elementary group operations). This approach makes it possible to create intelligent information security systems (ISPS). The purpose of the research is to develop post-quantum algorithms based on the integration of theories for constructing cryptosystems of symmetric and asymmetric cryptography with methods for constructing error-resistant codes. This approach allows you to regulate the required level of stability of the cryptosystems based on the requirements for the secrecy of the information message, as well as the time it is stored, and the level of stability of the system as ...
DOI:10.28925/2663-4023.2025.31.1061