2017
DOI: 10.15587/1729-4061.2017.109879
|View full text |Cite
|
Sign up to set email alerts
|

The development of the method of multifactor authentication based on hybrid crypto­code constructions on defective codes

Abstract: OTP-технології (Technology ofOne

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0
2

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 11 publications
0
4
0
2
Order By: Relevance
“…The main approaches to ensuring the reduction of energy costs for the practical implementation of CCC on ЕС, MEC, DC are considered in [14,46,47]. This approach allows forming a modified UMAC algorithm depending on the requirements and computational capabilities.…”
Section: Analysis Of the Construction Of The Cascade Umac Algorithm mentioning
confidence: 99%
“…The main approaches to ensuring the reduction of energy costs for the practical implementation of CCC on ЕС, MEC, DC are considered in [14,46,47]. This approach allows forming a modified UMAC algorithm depending on the requirements and computational capabilities.…”
Section: Analysis Of the Construction Of The Cascade Umac Algorithm mentioning
confidence: 99%
“…Поэтому актуальной задачей на сегодня является повышение скорости криптопреобразований с обеспечением требуемого уровня криптостойкости данного алгоритма. В работах [7] и [4] рассмотрены практические алгоритмы крипто-кодовых конструкций, которые обеспечивают их практическую реализацию за счет снижения мощности алфавита. Их применение в алгоритме UMAC позволит не только обеспечить требуемый уровень криптостойкости сформированного хеш-кода, но и сохранит его универсальность.…”
Section: литературный обзорunclassified
“…Их формирование основано на использовании алгебраических кодов, замаскированных под так называемый случайный код [2,3]. ККК позволяют интегрировано реализовать быстрое криптографическое преобразование данных и обеспечить достоверность передаваемых данных на основе помехоустойчивого кодирования [3,4].…”
Section: Introductionunclassified
“…out in(Evseev et al, 2016;Yevseiev, 2017;Yevseiev & Korol, 2018;Yevseiev et al, 2017)shows that the use of modified (shortened / extended) MECs can reduce the power capacity of the software implementation of the McEliece's MCCS almost in 2 times, but at the same time provide the required level of crypto stability while implementing a smaller field GF(26 -28).Investigation of the properties of construction of cryptosystems on the loss codes. In order to provide basic information security services, in the conditions of growing information security threats (IS), cyber security (CB), information security (IS) in works(Yevseiev, 2017;Yevseiev & Korol, 2018;Yevseiev et al, 2017), it is proposed to use hybrid crypto-code designs based on the synthesis of McEliece and Niederreiter MCCS on MEC and the unprofitable codes of multichannel cryptography.In the works(Yevseiev, 2017;Yevseiev & Korol, 2018) the theoretical and practical bases of the construction of loss codes are considered. Lucrative text is understood the text obtained because of further deformation of non-redundant codes of letters(Mishchenko & Vilansky, 2007;Mishchenko et al, 2006).…”
mentioning
confidence: 99%
“…In works(Evseev et al, 2016;Yevseiev, 2017;Yevseiev, & Korol, 2018;Yevseiev et al, 2017) a formal description of the McEliece's MCCS mathematical model on modified elliptic codes is considered,(Mishchenko et al, 2006) considered the universal mechanism of causing losses and methods of transmission in systems on redundancy codes. The main difference between mathematical models is the formation of a codogram based on shortening or lengthening, as well as the method of causing damage.…”
mentioning
confidence: 99%