Development of Niederriter crypto-code design models on LDPC-codes

С.С. Погасій, С.В. Мілевський, О.С. Жученко, Б.П. Томашевський, І.Р. Рагімова, С.В. Сергієв
{"title":"Development of Niederriter crypto-code design models on LDPC-codes","authors":"С.С. Погасій, С.В. Мілевський, О.С. Жученко, Б.П. Томашевський, І.Р. Рагімова, С.В. Сергієв","doi":"10.30748/soi.2021.167.05","DOIUrl":null,"url":null,"abstract":"The development of mobile technologies and computing resources has expanded the range of digital services and practically outstripped the development of computer technologies. This approach ensures the use of mobile and wireless networks in almost all areas of smart technologies, provides a further synthesis of cyberspace and the mobile Internet. However, the absence of security service protocols: confidentiality and integrity, initially when they are formed in the structure of LTE technologies, provides cyber attackers with the opportunity to use mobile Internet channels to implement targeted (APT) attacks. The development and emergence of a full-scale quantum computer with Shor and Grover algorithms can lead to a sharp decrease in the level of security of cryptosystems based on symmetric and asymmetric cryptography (including cryptography on elliptic curves). In addition, modern cyber threats have signs of synergy and hybridity, and their integration with social engineering methods practically does not allow providing the required level of preventive measures (protection). The article proposes post-quantum cryptosystems based on the Niederreiter crypto-code construction on low-density parity-check codes (LDPC-codes). This approach makes it easy to integrate into wireless networks based on IEEE 802.16 and IEEE 802.15.4 standards, as well as LTE mobile technologies. At the same time, the required level of resistance to modern threats ensured.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sistemi obrobki informatsiyi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30748/soi.2021.167.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The development of mobile technologies and computing resources has expanded the range of digital services and practically outstripped the development of computer technologies. This approach ensures the use of mobile and wireless networks in almost all areas of smart technologies, provides a further synthesis of cyberspace and the mobile Internet. However, the absence of security service protocols: confidentiality and integrity, initially when they are formed in the structure of LTE technologies, provides cyber attackers with the opportunity to use mobile Internet channels to implement targeted (APT) attacks. The development and emergence of a full-scale quantum computer with Shor and Grover algorithms can lead to a sharp decrease in the level of security of cryptosystems based on symmetric and asymmetric cryptography (including cryptography on elliptic curves). In addition, modern cyber threats have signs of synergy and hybridity, and their integration with social engineering methods practically does not allow providing the required level of preventive measures (protection). The article proposes post-quantum cryptosystems based on the Niederreiter crypto-code construction on low-density parity-check codes (LDPC-codes). This approach makes it easy to integrate into wireless networks based on IEEE 802.16 and IEEE 802.15.4 standards, as well as LTE mobile technologies. At the same time, the required level of resistance to modern threats ensured.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于ldpc码的Niederriter密码设计模型的开发
移动技术和计算资源的发展扩大了数字服务的范围,实际上超过了计算机技术的发展。这种方法确保了移动和无线网络在几乎所有智能技术领域的使用,提供了网络空间和移动互联网的进一步综合。然而,安全服务协议的缺失:保密性和完整性,最初是在LTE技术结构中形成的,为网络攻击者提供了利用移动互联网渠道实施目标(APT)攻击的机会。采用Shor和Grover算法的全尺寸量子计算机的发展和出现可能导致基于对称和非对称密码(包括椭圆曲线上的密码)的密码系统的安全性急剧下降。此外,现代网络威胁具有协同和混合的迹象,它们与社会工程方法的整合实际上无法提供所需的预防措施(保护)。本文提出了基于低密度奇偶校验码(ldpc -code)上的Niederreiter密码构造的后量子密码系统。这种方法可以很容易地集成到基于IEEE 802.16和IEEE 802.15.4标准以及LTE移动技术的无线网络中。与此同时,确保了对现代威胁的必要抵抗水平。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
15
审稿时长
6 weeks
期刊最新文献
Статистичний аналіз впливу факторів на моральний потенціал учасників бойових дій у системі Wolfram Mathematica Метод підвищення роздільної здатності широкосмугових сигналів по частоті Доплера на фоні адитивного шуму з невідомою щільністю розподілу імовірностей Модифікований рекурентний метод достовірної нечіткої кластеризації з використанням оптимізаційної процедури на основі косяків риб Методи об’єднання (консолідації) потоків повідомлень про повітряну обстановку від різнорідних джерел інформації Оцінка математичного сподівання кількості знищених засобів повітряного нападу угрупованням зенітних ракетних військ з урахуванням складу повітряного удару по об’єкту прикриття
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1