Запис Детальніше

DENIABLE ENCRYPTION BASED ON HYBRID CRYPTOGRAPHIC SYSTEMS USING

Науковий журнал «Радіоелектроніка, інформатика, управління»

Переглянути архів Інформація
 
 
Поле Співвідношення
 
##plugins.schemas.marc.fields.042.name## dc
 
##plugins.schemas.marc.fields.245.name## DENIABLE ENCRYPTION BASED ON HYBRID CRYPTOGRAPHIC SYSTEMS USING
 
##plugins.schemas.marc.fields.720.name## Galchenko, A. V.; Enterprise State «Scientific and Manufactured Complex «Iskra», Zaporizhzhya, Ukraine.
Choporov, S. V.; Zaporizhzhya National University, Zaporizhzhya, Ukraine.
 
##plugins.schemas.marc.fields.653.name## block encryption; brute force; deniable encryption; information and telecommunication system; denability; unauthorized access; data processing; pseudo-likelihood; public data; recognition; extended cryptographic schema Rabin; secret data, static data.
 
##plugins.schemas.marc.fields.520.name## <p>Context. Unauthorized access to well-protected information and telecommunication systems is a topical problem in the information security field [1]. For this problem solving, it is proposed to use the deniable encryption mechanisms, which allows its<br />managers to object to the existence of data, ensure their confidentiality and protect the information managers from brute force using by the intruders to obtain key information, during the unauthorized access to information. The article outlines the approach to the use of the existing deniable encryption algorithms for the protection of large data arrays.<br />Objective. The main purpose of this researching is a hypothesis test that it’s possibile to use deniable encryption algorithms for large data arrays protection, because all algorithms in this direction are asymmetric and not adapted to work with “big data”.                                                                                      Method. The test of hypothesis is carried out by additional data processing units using in the output deniable encryption algorithm with public key, which based on the extended cryptographic scheme of Rabin [2] and whose structure and features are most suitable for verifying this hypothesis put forward by the author.         Results. According to the experiments result, the authors proposed a prototype of deniable encryption algorithm with block encryption of data implemented, which also preserves the deniability mechanism features from the original deniable encryption algorithm. Besides, all changes in algorithm which were proposed by the authors provide the productivity increasing compared with existing approaches [3–6].                                                                                                 Conclusions. Authors have solved a problem of using the existing deniable encryption algorithms, for the large data arrays security, for example for the deniable encryption algorithm with open key, which based on the Rabin extended cryptographic scheme. The proposed approach of the hybrid algorithm constructing with deniable mechanism demonstrates not only the preservation of the basic algorithm properties, but also good performance of the any size data block encrypting ability. Proposed algorithm allows to solve not only the problem of ensuring data confidentiality during the unauthorized access to them, but also makes its suitable for practical using.</p>
 
##plugins.schemas.marc.fields.260.name## Zaporizhzhya National Technical University
2019-04-16 11:21:23
 
##plugins.schemas.marc.fields.856.name## application/pdf
http://ric.zntu.edu.ua/article/view/163888
 
##plugins.schemas.marc.fields.786.name## Radio Electronics, Computer Science, Control; No 1 (2019): Radio Electronics, Computer Science, Control
 
##plugins.schemas.marc.fields.546.name## uk
 
##plugins.schemas.marc.fields.540.name## Copyright (c) 2019 A. V. Galchenko, S. V. Choporov