public key

Data Encryption Method Based on the McEliece Cryptosystem and the Redundant Residue Number System

This paper proposes a data encryption method based on a modified McEliece cryptosystem, in which classic Goppa codes are replaced by error-correcting codes from the Redundant Residue Number System (RRNS). The construction of the RRNS code’s generator matrix and the formation of the public key as a composition of the G matrix, a scrambling matrix S, and a permutation matrix P have been described. An approach has been developed for selecting the RRNS moduli system, ensuring the necessary code parameters and the highest possible rank of the generator matrix.

Analysis of the Features of Secure Data Processing in Blockchain Technology Based on an Experimental Transaction Exchange Network

mechanisms for secure exchange of transactions are analyzed. The distributed structure of the blockchain network, built on the basis of a sequence of blocks containing transaction data, is considered. The fundamental features of the blockchain technology are described, as well as the 6-component multilayer blockchain architecture. The importance of using cryptographic hash functions to ensure the security and integrity of data in a blockchain network is shown.

Methods of Blockchain Technology Formation in the Arms Sales Accounting System

The article explores the application of blockchain technology in the field of arms sales accounting. The authors examine the main methods of forming such technology, including distributed ledger, hash functions, cryptographic protection, smart contracts, consensus protocols, decentralized network, transactions, genesis block, decentralized governance, and public key. The authors analyze the potential of these methods in creating an efficient and secure arms sales accounting system.