1. Science
  2. Publications
  3. Information Processing Systems
  4. 5(151)'2017
  5. The use of damaged codes in crypto code systems

The use of damaged codes in crypto code systems

S. Yevseiev
Annotations languages:


Description: The article proves the urgency of studies on the construction of hybrid (complex) cryptosystems based on systems on defective codes and crypto-code structures, with considering the requirements for technical security facilities in open communication systems and networks (CSN). The development of computer systems in the era of high technology extends the functional range of their application in various areas of open corporate and global systems. However, their development contributes to the modernization of old and the emergence of new attacks, the development of cyber-attacks on the management systems of corporate and global systems. This puts forward new requirements to the basic information security requirements for the circulating CSN, without reducing the basic reliability (authenticity) and efficiency (throughput) parameters affecting the quality of service for subscribers of open corporate and global networks. To ensure the evitable quality of service requirements, the work analyzes the fundamentals of building crypto-code systems based on the modified McElis and Niederreiter theoretic-code schemes on modified algebra-geometric codes (elliptic codes, EC), which allow one to provide (with integrated) the required reliability and efficiency indicators Crypto-transformations (1030 - 1035 group operations are provided with stability, with field strength GF (210), efficiency - at the level of performance, crypto formations block-symmetric ciphers (BSC) reliability – based on Algebraic (m-ary error-correcting codes) provide Posh 10-9 – 10-12). A significant drawback in the practical implementation of these cryptosystems is the significant energy costs due to the need to build on GF (210). An analysis of the theoretical foundations of the use of multichannel systems on defective codes is carried out. The results obtained make it possible to construct hybrid (complex) cryptosystems based on McElis modified non-symmetric crypto-coded systems (MCCS) using defective codes, the main difference from the known approaches for constructing hybrid cryptosystems is the use of MCCS instead of symmetric cryptosystems with the further use of systems on defective codes. For the first time, the approach proposed in the work of the formation of hybrid cryptosystems based on the MCCS on the defective codes makes it possible to reduce the energy costs in their practical implementation on the basis of a reduction in power, the alphabet used.


Keywords: asymmetric crypto-code system, the code-theoretic scheme, noise-resistant algebraic geometry codes, defective codes

Reference:
 Evseev, S.P. (2017), “Yspolzovanye ushcherbnыkh kodov v krypto-kodovыkh systemakh” [The use of damaged codes in crypto code systems], Information Processing Systems, Vol. 5(151), pp. 109-121. https://doi.org/10.30748/soi.2017.151.15.