Логотип репозиторію
  • English
  • Українська
  • Увійти
    Новий користувач? Зареєструйтесь. Забули пароль?
Логотип репозиторію
  • Фонди та зібрання
  • Пошук за критеріями
  • English
  • Українська
  • Увійти
    Новий користувач? Зареєструйтесь. Забули пароль?
  1. Головна
  2. Переглянути за автором

Перегляд за Автор "Ustimenko, Vasyl"

Зараз показуємо 1 - 4 з 4
Результатів на сторінці
Налаштування сортування
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    On desynchronised multivariate algorithms of El Gamal type for stable semigroups of affine Cremona group
    (Igor Sikorsky Kyiv Polytechnic Institute, 2019) Ustimenko, Vasyl
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    On the cryptosystems based on two Eulerian transformations defined over the commutative rings Z2s, s>1
    (Igor Sikorsky Kyiv Polytechnic Institute, 2024) Ustimenko, Vasyl
    We suggest the family of ciphers sEn, n = 2, 3, ... with the space of plaintexts (Z2^s)^n, s > 1, such that the encryption map is the composition of kinds G = G1 A1 G2 A2, where Ai are the affine transformations from AGLn(Z2^s) preserving the variety (Z*2^s)^n. Eulerian endomorphisms Gi, i = 1, 2, of K[x1, x2, ..., xn] move xi to the monomial term M x1^d(1) x2^d(2) ... xn^d(n), M in Z2^s, and act on (Z2^s)^n as bijective transformations. The cipher is converted to a protocol-supported cryptosystem. Protocols of Noncommutative Cryptography implemented on the platform of Eulerian endomorphisms are used for the delivery of Gi and Ai from Alice to Bob. One can use twisted Diffie-Hellman protocols, which security rests on the complexity of the Conjugacy Power problem, or the hidden tame homomorphism protocol, which security rests on the word decomposition problem. Instead of delivering Gi, Alice and Bob can elaborate these transformations via the inverse twisted Diffie-Hellman protocol, implemented on the platform of tame Eulerian transformations of (Z*2^s)^n. The cost of a single protocol is O(n^3), and the cost of computing the reimage of the used nonlinear map is O(n^2). So, the verification of nt, t ≥ 1, signatures takes time O(nt + 2). Instead of the inverse twisted Diffie-Hellman protocol, correspondents can use the inverse hidden tame homomorphism protocol, which rests on the complexity of word decomposition for tame Eulerian transformations. We use natural bijections between Z2^s and Z2^(s-1), Z2^s and finite field F2^(s-1), and Z2^s and Boolean ring B(s-1) of order 2^(s-1) to modify the family of ciphers or cryptosystems via the change of AGLn(Z2^s) for AGLn(K), where K is one of the rings Z2^(s-1), F2^(s-1), or B(s-1). New ciphers are defined via the multiplication of two different commutative rings Z2^s and K. This does not allow treating them as stream ciphers of multivariate cryptography and using corresponding cryptanalytic techniques. An adversary is not able to use known cryptanalytical methods such as linearization attacks. We discuss the option of changing the elements of AGLn(Z2^s) or AGLn(K) for nonlinear multivariate transformations F of (Z2^s)^n or K^n with a symmetric trapdoor accelerator T, i.e., a piece of information such that the knowledge of T allows computing the value F(p) for an arbitrarily chosen p in P in time O(n^2) and solving the equation of the form F(x) = c for each c in C in time O(n^2).
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    On the Generator of Stable Cubical Multivariate Encryption Maps Over Boolean Rings for Protection of Large Information System
    (Igor Sikorsky Kyiv Polytechnic Institute, 2021) Ustimenko, Vasyl; Klisowski, Michal
    Encryption based on Walks in Algebraic GRAphs (EWAGRA) is used for protection of authors' rights, access to electronic books or documents located at a certain knowledge base (Information Quality Assurance Support Systems of a university, digital library supporting distance education, various digital archives and etc). The method allows generating nonlinear stream ciphers, which have some similarities with a one-time pad: different keys produce distinct ciphertexts from the same plaintext. In contrast to the case of a one-time pad, the length of the key is flexible and the encryption map is a nonlinear poly- nomial map, which order is growing with the growth of the dimension n of the plaintext space. The encryption has good resistance to attacks of the adversary when he has no access to plaintext space or has a rather small number of intercepted plaintext- ciphertext pairs. It is known that encryption and decryption maps are cubical maps. So, interception of n3 + O(n) plaintext-ciphertext pairs allows conducting a plain linearization attack for finding the inverse map. We consider the idea of the modification of this encryption algorithm after sending each message without using key exchange protocols. So the new algorithm is resistant to plain linearization attacks.
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    On the usage of postquantum protocols defined in terms of transformation semigroups and their homomophisms
    (Igor Sikorsky Kyiv Polytechnic Institute, 2020) Ustimenko, Vasyl

DSpace software copyright © 2002-2025 LYRASIS

  • Налаштування куків
  • Зворотній зв'язок