基于ldpc码的Niederriter密码设计模型的开发

С.С. Погасій, С.В. Мілевський, О.С. Жученко, Б.П. Томашевський, І.Р. Рагімова, С.В. Сергієв
{"title":"基于ldpc码的Niederriter密码设计模型的开发","authors":"С.С. Погасій, С.В. Мілевський, О.С. Жученко, Б.П. Томашевський, І.Р. Рагімова, С.В. Сергієв","doi":"10.30748/soi.2021.167.05","DOIUrl":null,"url":null,"abstract":"The development of mobile technologies and computing resources has expanded the range of digital services and practically outstripped the development of computer technologies. This approach ensures the use of mobile and wireless networks in almost all areas of smart technologies, provides a further synthesis of cyberspace and the mobile Internet. However, the absence of security service protocols: confidentiality and integrity, initially when they are formed in the structure of LTE technologies, provides cyber attackers with the opportunity to use mobile Internet channels to implement targeted (APT) attacks. The development and emergence of a full-scale quantum computer with Shor and Grover algorithms can lead to a sharp decrease in the level of security of cryptosystems based on symmetric and asymmetric cryptography (including cryptography on elliptic curves). In addition, modern cyber threats have signs of synergy and hybridity, and their integration with social engineering methods practically does not allow providing the required level of preventive measures (protection). The article proposes post-quantum cryptosystems based on the Niederreiter crypto-code construction on low-density parity-check codes (LDPC-codes). This approach makes it easy to integrate into wireless networks based on IEEE 802.16 and IEEE 802.15.4 standards, as well as LTE mobile technologies. At the same time, the required level of resistance to modern threats ensured.","PeriodicalId":32737,"journal":{"name":"Sistemi obrobki informatsiyi","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Development of Niederriter crypto-code design models on LDPC-codes\",\"authors\":\"С.С. Погасій, С.В. Мілевський, О.С. Жученко, Б.П. Томашевський, І.Р. Рагімова, С.В. Сергієв\",\"doi\":\"10.30748/soi.2021.167.05\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The development of mobile technologies and computing resources has expanded the range of digital services and practically outstripped the development of computer technologies. This approach ensures the use of mobile and wireless networks in almost all areas of smart technologies, provides a further synthesis of cyberspace and the mobile Internet. However, the absence of security service protocols: confidentiality and integrity, initially when they are formed in the structure of LTE technologies, provides cyber attackers with the opportunity to use mobile Internet channels to implement targeted (APT) attacks. The development and emergence of a full-scale quantum computer with Shor and Grover algorithms can lead to a sharp decrease in the level of security of cryptosystems based on symmetric and asymmetric cryptography (including cryptography on elliptic curves). In addition, modern cyber threats have signs of synergy and hybridity, and their integration with social engineering methods practically does not allow providing the required level of preventive measures (protection). The article proposes post-quantum cryptosystems based on the Niederreiter crypto-code construction on low-density parity-check codes (LDPC-codes). This approach makes it easy to integrate into wireless networks based on IEEE 802.16 and IEEE 802.15.4 standards, as well as LTE mobile technologies. At the same time, the required level of resistance to modern threats ensured.\",\"PeriodicalId\":32737,\"journal\":{\"name\":\"Sistemi obrobki informatsiyi\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Sistemi obrobki informatsiyi\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30748/soi.2021.167.05\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sistemi obrobki informatsiyi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30748/soi.2021.167.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

移动技术和计算资源的发展扩大了数字服务的范围,实际上超过了计算机技术的发展。这种方法确保了移动和无线网络在几乎所有智能技术领域的使用,提供了网络空间和移动互联网的进一步综合。然而,安全服务协议的缺失:保密性和完整性,最初是在LTE技术结构中形成的,为网络攻击者提供了利用移动互联网渠道实施目标(APT)攻击的机会。采用Shor和Grover算法的全尺寸量子计算机的发展和出现可能导致基于对称和非对称密码(包括椭圆曲线上的密码)的密码系统的安全性急剧下降。此外,现代网络威胁具有协同和混合的迹象,它们与社会工程方法的整合实际上无法提供所需的预防措施(保护)。本文提出了基于低密度奇偶校验码(ldpc -code)上的Niederreiter密码构造的后量子密码系统。这种方法可以很容易地集成到基于IEEE 802.16和IEEE 802.15.4标准以及LTE移动技术的无线网络中。与此同时,确保了对现代威胁的必要抵抗水平。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Development of Niederriter crypto-code design models on LDPC-codes
The development of mobile technologies and computing resources has expanded the range of digital services and practically outstripped the development of computer technologies. This approach ensures the use of mobile and wireless networks in almost all areas of smart technologies, provides a further synthesis of cyberspace and the mobile Internet. However, the absence of security service protocols: confidentiality and integrity, initially when they are formed in the structure of LTE technologies, provides cyber attackers with the opportunity to use mobile Internet channels to implement targeted (APT) attacks. The development and emergence of a full-scale quantum computer with Shor and Grover algorithms can lead to a sharp decrease in the level of security of cryptosystems based on symmetric and asymmetric cryptography (including cryptography on elliptic curves). In addition, modern cyber threats have signs of synergy and hybridity, and their integration with social engineering methods practically does not allow providing the required level of preventive measures (protection). The article proposes post-quantum cryptosystems based on the Niederreiter crypto-code construction on low-density parity-check codes (LDPC-codes). This approach makes it easy to integrate into wireless networks based on IEEE 802.16 and IEEE 802.15.4 standards, as well as LTE mobile technologies. At the same time, the required level of resistance to modern threats ensured.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
15
审稿时长
6 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信