Encryption Method Based on Codes
This paper proposes an improvement of the McEliece asymmetric cryptosystem based on code-based cryptography by replacing the permutation matrix with a modulo operation and using a finite field $GF(q)$.
This paper proposes an improvement of the McEliece asymmetric cryptosystem based on code-based cryptography by replacing the permutation matrix with a modulo operation and using a finite field $GF(q)$.
With the constant development of information technology and the growing threat of cyber attacks, the security of Wi-Fi wireless networks is of particular relevance. This article aims to provide an in-depth analysis of modern Wi-Fi security protocols such as WPA2, WPA3, and OWE, focusing on their strengths and weaknesses in securing the network against the most common types of attacks.
На основі алгоритму RSA як найбільш вживаного промислового стандарту шифрування даних запропоновано модифікації з використанням проективних відо- бражень та афінних перетворень для шифрування зображень, що дають змогу строго виділяти контури.
Based on the algorithm of RSA, as the most common industry standard data encryption, proposed modifications using projective mappings and affine transformation for image encryption, allowing strictly allocate paths.
The requirements are formed, the method is chosen and the main stages of development of mobile means of neuro-like cryptographic encryption and real-time data decryption are considered. It is shown that the development of mobile means of neuro-like cryptographic encryption and decryption of real-time data with high efficiency of equipment is reduced to minimize hardware costs while providing a variety of requirements, characteristics and limitations. The tabular-algorithmic method of calculating the scalar product has been improved.
The system model of wireless technologies security was proposed on a level of the structure “system – signal – channel – tract” and its metrological support according to the conception “object – threat – defence”. The software of data encryption procedure for WiMAX systems based on AES standart and C# programming language was developed in limits of the created model.
In this paper a scheme of data encryption and decryption that takes advantage of fast parametrized orthogonal transforms has been proposed. A way of mapping the private key to the values of transform parameters has been formulated and the effectiveness of the proposed scheme has been verified experimentally. Moreover, the authors propose the directions of further research and development of the considered data encryption scheme.