PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Creating an algorithm of encryption based on prime numbers in positional systems of calculating residual classes

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Tworzenie algorytmu szyfrowania na bazie liczb pierwszych w pozycyjnych układach obliczania klas resztowych
Języki publikacji
EN
Abstrakty
EN
Building a secure local and remote data warehouse requires data transfer over network channels, identification and authentication of objects and subjects of information protection. Development of reliable and efficient cryptographic tools for information protection and security is needed. The goal is achieved through the development of encryption algorithms, formation and exchange of secret keys on the basis of the residual class system. In the article an unconventional algorithm of enciphering an electronic message of a given length consisting of two stages has been proposed.
PL
Budowanie bezpiecznej lokalnej i zdalnej hurtowni danych rymaga przesyłu danych przez kanały sieciowe, identyfikacji i uwierzytelniania obiektów i podmiotów ochrony informacji. Potrzebne jest opracowanie niezawodnych i wydajnych narzędzi kryptograficznych do ochrony i bezpieczeństwa informacji. Cel ten jest osiągany poprzez rozwój algorytmów szyfrowania, tworzenie i wymianę tajnych kluczy na podstawie systemu klas resztkowych. W artykule zaproponowano niekonwencjonalny algorytm szyfrowania wiadomości elektronicznej o zadanej długości, składający się z dwóch etapów.
Rocznik
Strony
164--169
Opis fizyczny
Bibliogr. 29 poz.
Twórcy
autor
  • Politechnika Lubelska, Instytut Elektroniki i Technik Informacyjnych, Nadbystrzycka 38A, 20-618 Lublin
  • Institute of Information and Computational Technologies of SC MES RK, Pushkin 125, 050010 Almaty, Kazakhstan
  • al-Farabi Kazakh National University, 71 al-Farabi Ave., Almaty, Kazakhstan
autor
  • Institute of Information and Computational Technologies of SC MES RK, Pushkin 125, 050010 Almaty, Kazakhstan
  • al-Farabi Kazakh National University, 71 al-Farabi Ave., Almaty, Kazakhstan
autor
  • Institute of Information and Computational Technologies of SC MES RK, Pushkin 125, 050010 Almaty, Kazakhstan
  • al- Farabi Kazakh National University, 71 al-Farabi Ave., Almaty, Kazakhstan
autor
  • Institute of Information and Computational Technologies of SC MES RK, Pushkin 125, 050010 Almaty, Kazakhstan
  • al-Farabi Kazakh National University, 71 al-Farabi Ave., Almaty, Kazakhstan
autor
  • al-Farabi Kazakh National University, 71 al-Farabi Ave., Almaty, Kazakhstan
  • Abai Kazakh National Pedagogical University, Dostyk аve. 13, 050010 Almaty, Kazakhstan
  • al-Farabi Kazakh National University, 71 al-Farabi Ave., Almaty, Kazakhstan
  • Abai Kazakh National Pedagogical University, Dostyk аve. 13, 050010 Almaty, Kazakhstan
Bibliografia
  • [1] Shannon K., Mathematical theory of communication, Works on computer science and cybernetics, Moscow: IIL,(1963), 245-332.
  • [2] Shannon K., Theory of communication in secret systems, Proceedings on computer science and cybernetics, Moscow: IIL, (1963), 333-402.
  • [3] Harbarchuk V., Wójcik W., Zadiraka V., Computer Technologies for Information Security, Lublin: Lublin University of Technology, (2011)
  • [4] DES Modes of Operation, FIPS 81, http//:csrc.nist.gov, (1980).
  • [5] Diffie U., Hellman M.E., Security and Spoofing Resistance: Introduction to Cryptography, TIIER - Proceedings of the Institute of Electrical and Electronics Engineering, 67(1979), No.3. 71-109.
  • [6] Alferov A.P., Zubov A.Yu., Kuzmin A.S., Cheremushkin A.V. Fundamentals of Cryptography: study guide for higher education institutions. 2nd edition. Helios ARV, (2002).
  • [7] Schneier B.A., Applied cryptography. Protocols, algorithms, initial tests in C language, Moscow, TRIUMPH, (2003).
  • [8] Forouzan B.A., Cryptography and network security: Textbook, Moscow: Internet-University of Information Techn. BINOM. Knowledge lab, (2010).
  • [9] Zenzin O.S., Ivanov M.A. The cryptographic protection standard -AES. Finite fields, KUDITS-OBRAZ, (2002).
  • [10] Panasenko S.P. Algorithms of coding. Special reference book, SPb.: BHV-Petersburg, (2009).
  • [11] GOST 28147-89, Information processing system. Cryptographic protection. Algorithm of cryptographic transformation, Moscow, Gosstandart SSR, (1989).
  • [12] Omiotek Z., Burda A., Wójcik W., The use of decision tree induction and artificial neural networks for automatic diagnosis of Hashimoto`s disease, Expert Systems With Applications, 40(2013), No. 16, 6684-6689.
  • [13] Biyashev R., Nyssanbayeva S., Kapalova N., Asymmetric Encryption on the Basis of Non-positional Polynomial Notations, Proceedings of the 6th International Conference on Applied Informatics and Computing Theory (AICT '15), (2015), 225-231.
  • [14] Biyashev R. G., Nyssanbayeva S.E., Kapalova N.A., Duysenbayev D.S., Modeling of software implementation of asymmetric non-position encryption scheme, Proceedings of "XI International Asian School and Seminar "Problems of complex systems optimization", (2015), 162-166.
  • [15] Biyashev R., Kalimoldayev M., Nyssanbayeva S., Kapalova N., Khakimov R., Software Implementation of the Cryptographic System Models with the Given Cryptostrength, Bulletin of the KazNU. Al-Farabi, series of mathematics, mechanics, computer science, 86(2015), No. 3,117-121.
  • [16] Biyashev, R. Nyssanbayeva S., Kapalova N., Haumen A., Modified symmetric block encryption-decryption algorithm based on modular arithmetic, Proceedings of the International Conference on Wireless Communications, Network Security and Signal Processing (WCNSSP2016), (2016), 263-265.
  • [17] Biyashev R., Nyssanbayeva S., Kapalova N., Asymmetric Encryption on the Basis of Non-positional Polynomial Notations, Proceedings of the 6th International Conference on Applied Informatics and Computing Theory (AICT '15), (2015), 225-231.
  • [18] Biyashev R., Nyssanbayeva S., Kapalova N., Khakimov R., Modular models of the cryptographic protection of information, Proc. International Conference on Computer Networks and Information Security (CNIS2015), (2015), 393-398.
  • [19] Biyashev R., Nyssanbayeva S., Kapalova N., Khakimov R.A., Development of a cryptographic protection system based on modular arithmetic, Proc. XIII International Scientific and Practical Conference "IB-2013". Part I.-Taganrog: SFU publ.house, (2013), 215-220.
  • [20] Nyssanbayeva S.E., Magzom М.М. Simulation of nontraditional encryption algorithm, Bulletin of KazNTU, (2015), No.4, 596-599.
  • [21] 19. Akushskyi I.Y., Yudickiy D.I. Machine arithmetic in the residual classes.-M .:Soviet radio,1968.-p.439.
  • [22] 20. Biyashev R.G. Development and research of methods of end-to-end reliability increase in data exchange systems of distributed Automatic Control Systems: Thesis for a degree of Dr of Tech.Sc. - М.,1985.-p.328.
  • [23] SТ RК 1073-2007. Tools of cryptographic protection of information/ General technical requirements, Ent. 2009.01.01.- Astana, (2009), 15.
  • [24] Devyanin P.N., Models of security of computer systems. Control of access and information flows, Training manual for high schools, Moscow, Hot line-Telecom, (2011).
  • [25] Gaidamakin N.A., Theoretical foundations of Computer Security: training manual, Ekaterinburg: Publishing House of the Ural University, (2008).
  • [26] Ivanov M.А. Cryptographic methods of information protection in computer systems and networks. Educational-reference publication, Moscow: KUDITS-OBRAZ, (2001).
  • [27] Kapalova N., Dyusenbayev D., Security analysis of an encryption scheme based on nonpositional polynomial notations, Open Engineering, (2016), No.6, 250-258.
  • [28] Kapalova N.A., Dyusenbayev D.S., Cryptanalysis of the encryption algorithm on the basis of non-position polynomial number notations, Bulletin of KazNU. Mathematics, Mechanics, Informatics Series. Almaty, 90(2016), No.3/1, 41-51.
  • [29] Akushskyi I.Y., Khatskevich V.K., Inverse representations of numbers in the system of residual classes, Digital computer engineering and programming, edition 2., (1967).
Uwagi
Opracowanie w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-de7c858b-844e-4dc8-a32b-a536bb31e832
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.