Розглядаються загальна конструкція теоретико-кодових схем (ТКС), несиметрична крипто-кодова система (НККС) на основі ТКС Мак-Еліса на укорочених (модифікованих) еліптичних кодах. Пропонується математична модель НККС Мак-Еліса, алгоритми формування та розшифрування/розкодування криптограми/кодограми, аналізуються витрати на програмну реалізацію крипто-кодових засобів захисту інформації на основі ТКС Мак-Еліса Ключові слова: несиметрична крипто-кодова система, теоретико-кодова схема, модифіковані перешкодостійкі коди Рассматриваются общая конструкция теоретико-кодовых схем (ТКС), несимметричная крипто-кодовая система (НККС) на основе ТКС Мак-Элиса на укороченных (модифицированных) эллиптических кодах. Предлагается математическая модель НККС Мак-Элиса, алгоритмы формирования и расшифрования/раскодирования криптограммы/кодограммы, анализируются затраты на программную реализацию крипто-кодовых средств защиты информации на основе ТКС Мак-ЭлисаКлючевые слова: несимметричная криптокодовая система, теоретико-кодовая схема, модифицированные помехоустойчивые коды UDC 621.391
The modern development of high technologies and computer technology greatly enhanced the development of automated banking systems of banking sector organizations and allowed the synthesis of information and communication technologies for their formation. However, the era of high technology has increased the range of threats to banking information resources; threats have gained signs of hybridity and synergy. In these conditions, the current issue in shaping the information security management system in banking sector organizations is the formation and analysis of modern threats. In order to generalize the approach of classification of hybrid cyber threats to the components of security: information security, cybersecurity, security of information banking information resources in the work proposed an advanced classification of threats to banking information resources. The classifier takes into account ISO / OSI model levels in automated banking systems, the targeting of threats to security services and their criticality of damage. The article analyzes contemporary international standards and normative documents of the National Bank of Ukraine on security issues of banking information resources. On the basis of this analysis, we propose estimates of the level of danger to intruders and the degree of implementation of protective measures under the conditions of modern hybrid cyber threats.
Subject of research is the modification of the Niederreiter crypto-code construction on non-binary codes. The purpose of this work is to develop a mathematical model of a modified Niederreiter crypto-code structure using algebrogeometric block codes with a shortening of the information parcel. The tasks to be solved are: to formalize the procedures for the formation of codograms and their further decoding; develop a mathematical model of the Niederreiter crypto-code structure modified by shortening the information parcel and fixing the admissible positional vectors of the plaintext transformation based on equilibrium coding. The following results were obtained. Studies of the Niederreiter crypto-code structures in MES revealed the main reason for the impossibility of the practical implementation of decoding algorithms when using non-binary codes in the classical scheme. It has been established that it is necessary to fix a subset of plaintext for which the error localization procedure, with the X, P and D (private key) masking matrices selected by the sender, cannot be performed. With its help, we need to "weed out" the error vector sets that do not allow using the classical version of decoding information on the receiving side when using the classical Niederreiter scheme on m-th codes. When constructing a mathematical model, the identified feature was considered. As a result, a mathematical model of the Niederreiter cryptocode structure modified by shortening the information package and fixing admissible positional vectors of the plaintext transformation based on equilibrium coding is obtained. Conclusion. The scientific novelty of the obtained results is as follows: the proposed modified mathematical model of the Niederreiter crypto-code structure ensures its practical implementation. Reducing the field power when building a classic Niederreiter scheme reduces the amount of data transferred by shortening the error vector before generating the syndrome on the sender side and, accordingly, the energy costs of its implementation; The use of the quantum-stable and promising Niederreiter crypto-code construction has been further developed, the identified feature and the proposed modification ensure its competitiveness. K e ywor d s : modified Niederreiter crypto-code structure; modified shortened elliptic-curve codes; equilibrium coding; information secrecy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.