Abstract
A system is offered for imitation resistant transmitting of encrypted information in wireless communication networks on the basis of redundant residue polynomial codes. The particular feature of this solution is complexing of methods for cryptographic protection of information and multi-character codes that correct errors, and the resulting structures (crypt-code structures) ensure stable functioning of the information protection system in the conditions simulating the activity of the adversary. Such approach also makes it possible to create multi-dimensional “crypt-code structures” to conduct multi-level monitoring and veracious restoration of distorted encrypted information. The use of authentication codes as a means of one of the levels to detect erroneous blocks in the ciphertext in combination with the redundant residue polynomial codes of deductions makes it possible to decrease the introduced redundancy and find distorted blocks of the ciphertext to restore them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ferguson, N., Schneier, B.: Applied Cryptography. Wiley, New York (2003)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, London (1997)
Knudsen, L.R.: Block chaining modes of operation. Reports in Informatics No. 207, Dept. of Informatics, University of Bergen, Norway (2000). October
Paar, C., Pelzl, J.: Understanding Cryptography. Springer, Heidelberg (2010)
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Progress Report 42-44, pp. 114–116, JPL, Caltech (1978)
Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15(2), 159–166 (1986)
Samokhina, M.A.: Modifications of Niederreiter cryptosystems, its cryptographically strong and practical applications. In: Papers of the Proceedings of Moscow Institute of Physics and Technology, vol. 1(2), 121–128 (2009)
van Tilborg, H.: Error-correcting codes and Cryptography. Code-based Cryptography Workshop, Eindhoven (2011). May
Petlevannyj, A.A., Finko, O.A., Samoylenko, D.V., Dichenko, S.A.: Device for spoofing resistant coding and decoding information with excessive systematic codes. RU Patent No. 2634201 (2017)
Finko, O.A.: Group control of asymmetric cryptosystems using modular arithmetic methods. In: Papers of the XIV Inter. school-seminar “Synthesis and complexity of control systems”, pp. 85–87 (2003)
Finko, O.A. Samoylenko, D.V.: Designs that monitor errors based on existing cryptographic standards. In: Papers of the VIII Intern. conf. “Discrete models in the theory of control systems”, pp. 318–320 (2009)
Finko, O.A., Dichenko, S.A., Samoylenko, D.V.: Method of secured transmission of encrypted information over communication channels. RU Patent No. 2620730 (2017)
Bossen, D.C., Yau, S.S.: Redundant residue polynomial codes. Inf. Control 13(6), 597–618 (1968)
Mandelbaum, D.: On efficient burst correcting residue polynomial codes. Inf. Control 16(4), 319–330 (1970)
Yu, J-H., Loeliger, H-A.: Redundant Residue Polynomial Codes. In: Papers of the IEEE International Symposium of Inform. Theory Proceed, pp. 1115–1119 (2011)
Simmons, G.J.: Authentication theory/coding theory. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science. Springer, Heidelberg (1985)
Zubov, A.Y.: Authentication codes. Gelios-ARV, Moscow (2017)
Bloch, E.L., Zyablov, B.B.: Generalized Concatenated Codes. Sviaz, Moscow (1976)
MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland Mathematical Library (1977)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Samoylenko, D., Eremeev, M., Finko, O., Dichenko, S. (2019). Protection of Information from Imitation on the Basis of Crypt-Code Structures. In: Pejaś, J., El Fray, I., Hyla, T., Kacprzyk, J. (eds) Advances in Soft and Hard Computing. ACS 2018. Advances in Intelligent Systems and Computing, vol 889. Springer, Cham. https://doi.org/10.1007/978-3-030-03314-9_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-03314-9_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03313-2
Online ISBN: 978-3-030-03314-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)