Показати скорочену інформацію

dc.contributor.authorSaiko, V. G.uk
dc.contributor.authorKrasilenko, V. G.uk
dc.contributor.authorKiporenko, S. S.uk
dc.contributor.authorChikov, I. A.uk
dc.contributor.authorNikitovych, D. V.uk
dc.contributor.authorСайко, В. Г.uk
dc.contributor.authorКрасиленко, В. Г.uk
dc.contributor.authorКіпоренко, С. С.uk
dc.contributor.authorЧіков, І. А.uk
dc.contributor.authorНікітович, Д. В.uk
dc.date.accessioned2024-04-10T08:05:16Z
dc.date.available2024-04-10T08:05:16Z
dc.date.issued2024uk
dc.identifier.citationSaiko V., Krasilenko V., Kiporenko S., Chikov I., Nikitovych D. Modeling of a cryptographic protocol for matching a shared secret key-permutation of significant dimension with its isomorphic representations. Papers of the X International Scientific Conference «Information Technology and Implementation», Kyiv, Ukraine, November 20-21, 2023. 2023. Pp. 196-205. URI: https://ceur-ws.org/Vol-3646/Paper_19.pdf.uk
dc.identifier.issn1613-0073uk
dc.identifier.urihttp://ir.lib.vntu.edu.ua//handle/123456789/41416
dc.description.abstractA protocol for agreement by user parties of secret keys-permutations of significant dimension and their new isomorphic matrix representations is proposed. Features and advantages of such representations are considered. The need to create such secret permutation keys to improve the cryptographic stability of matrix affine-permutation ciphers and other cryptosystems of the new matrix type is well-founded. The results of modeling the basic procedures of the proposed key agreement protocol in the form of an isomorphic permutation of a significant dimension, namely the processes of generating permutation matrices and their degrees, are given. Model experiments of the protocol as a whole, including accelerated methods of raising permutations to significant degrees, were performed. Such methods use sets of fixed permutation matrices, which are degrees of the underlying permutation matrix, and all these matrices are given in their isomorphic representations. The values of the fixed exponents correspond to the corresponding weights of the digits of the binary or other code representations of the ed random numbers. The results of simulation modeling demonstrated the adequacy and advantages of isomorphic representations of the processes of functioning of matrix-algebraic models of cryptographic transformations and the proposed secret key-permutation agreement protocol.uk_UA
dc.language.isouk_UAuk_UA
dc.publisherRWTH Aachen Universityuk
dc.relation.ispartofPapers of the X International Scientific Conference «Information Technology and Implementation», Kyiv, Ukraine, November 20-21, 2023 : 196-205.uk
dc.subjectматрично-алгебраїчна модельuk
dc.subjectматричні представленняuk
dc.subjectізоморфний ключ перестановкиuk
dc.subjectкриптограмаuk
dc.subjectкриптографічні перетворенняuk
dc.subjectафінно-перестановочний шифрuk
dc.subjectпротоколuk
dc.subjectкриптосистема матричного типуuk
dc.subjectmatrix-algebraic modeluk
dc.subjectmatrix representationsuk
dc.subjectisomorphic permutation keyuk
dc.subjectcryptogramuk
dc.subjectcryptographic transformationsuk
dc.subjectaffine-permutation cipheruk
dc.subjectprotocoluk
dc.subjectmatrix-type cryptosystemuk
dc.titleModeling of a cryptographic protocol for matching a shared secret key-permutation of significant dimension with its isomorphic representationsuk
dc.typeThesis
dc.identifier.orcidhttps://orcid.org/0000-0002-3059-6787uk
dc.identifier.orcidhttps://orcid.org/0000-0001-6528-3150uk
dc.identifier.orcidhttps://orcid.org/0000-0001-5045-5052uk
dc.identifier.orcidhttps://orcid.org/0000-0002-2128-5506uk
dc.identifier.orcidhttps://orcid.org/0000-0002-8907-1221uk


Файли в цьому документі

Thumbnail

Даний документ включений в наступну(і) колекцію(ї)

Показати скорочену інформацію