Skip to main content

Protection of Information from Imitation on the Basis of Crypt-Code Structures

  • Conference paper
  • First Online:
Advances in Soft and Hard Computing (ACS 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 889))

Included in the following conference series:

  • 370 Accesses

Abstract

A system is offered for imitation resistant transmitting of encrypted information in wireless communication networks on the basis of redundant residue polynomial codes. The particular feature of this solution is complexing of methods for cryptographic protection of information and multi-character codes that correct errors, and the resulting structures (crypt-code structures) ensure stable functioning of the information protection system in the conditions simulating the activity of the adversary. Such approach also makes it possible to create multi-dimensional “crypt-code structures” to conduct multi-level monitoring and veracious restoration of distorted encrypted information. The use of authentication codes as a means of one of the levels to detect erroneous blocks in the ciphertext in combination with the redundant residue polynomial codes of deductions makes it possible to decrease the introduced redundancy and find distorted blocks of the ciphertext to restore them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ferguson, N., Schneier, B.: Applied Cryptography. Wiley, New York (2003)

    MATH  Google Scholar 

  2. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, London (1997)

    MATH  Google Scholar 

  3. Knudsen, L.R.: Block chaining modes of operation. Reports in Informatics No. 207, Dept. of Informatics, University of Bergen, Norway (2000). October

    Google Scholar 

  4. Paar, C., Pelzl, J.: Understanding Cryptography. Springer, Heidelberg (2010)

    Book  Google Scholar 

  5. McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Progress Report 42-44, pp. 114–116, JPL, Caltech (1978)

    Google Scholar 

  6. Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15(2), 159–166 (1986)

    MathSciNet  MATH  Google Scholar 

  7. Samokhina, M.A.: Modifications of Niederreiter cryptosystems, its cryptographically strong and practical applications. In: Papers of the Proceedings of Moscow Institute of Physics and Technology, vol. 1(2), 121–128 (2009)

    Google Scholar 

  8. van Tilborg, H.: Error-correcting codes and Cryptography. Code-based Cryptography Workshop, Eindhoven (2011). May

    Google Scholar 

  9. Petlevannyj, A.A., Finko, O.A., Samoylenko, D.V., Dichenko, S.A.: Device for spoofing resistant coding and decoding information with excessive systematic codes. RU Patent No. 2634201 (2017)

    Google Scholar 

  10. Finko, O.A.: Group control of asymmetric cryptosystems using modular arithmetic methods. In: Papers of the XIV Inter. school-seminar “Synthesis and complexity of control systems”, pp. 85–87 (2003)

    Google Scholar 

  11. Finko, O.A. Samoylenko, D.V.: Designs that monitor errors based on existing cryptographic standards. In: Papers of the VIII Intern. conf. “Discrete models in the theory of control systems”, pp. 318–320 (2009)

    Google Scholar 

  12. Finko, O.A., Dichenko, S.A., Samoylenko, D.V.: Method of secured transmission of encrypted information over communication channels. RU Patent No. 2620730 (2017)

    Google Scholar 

  13. Bossen, D.C., Yau, S.S.: Redundant residue polynomial codes. Inf. Control 13(6), 597–618 (1968)

    Article  MathSciNet  Google Scholar 

  14. Mandelbaum, D.: On efficient burst correcting residue polynomial codes. Inf. Control 16(4), 319–330 (1970)

    Article  MathSciNet  Google Scholar 

  15. Yu, J-H., Loeliger, H-A.: Redundant Residue Polynomial Codes. In: Papers of the IEEE International Symposium of Inform. Theory Proceed, pp. 1115–1119 (2011)

    Google Scholar 

  16. Simmons, G.J.: Authentication theory/coding theory. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science. Springer, Heidelberg (1985)

    Google Scholar 

  17. Zubov, A.Y.: Authentication codes. Gelios-ARV, Moscow (2017)

    Google Scholar 

  18. Bloch, E.L., Zyablov, B.B.: Generalized Concatenated Codes. Sviaz, Moscow (1976)

    Google Scholar 

  19. MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland Mathematical Library (1977)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oleg Finko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Samoylenko, D., Eremeev, M., Finko, O., Dichenko, S. (2019). Protection of Information from Imitation on the Basis of Crypt-Code Structures. In: Pejaś, J., El Fray, I., Hyla, T., Kacprzyk, J. (eds) Advances in Soft and Hard Computing. ACS 2018. Advances in Intelligent Systems and Computing, vol 889. Springer, Cham. https://doi.org/10.1007/978-3-030-03314-9_28

Download citation

Publish with us

Policies and ethics