Possibilities for authentication of the interaction parties based on recurrent sequences
DOI:
https://doi.org/10.18372/2410-7840.15.5509Keywords:
information security, cryptography, authentication, recurrent sequenceAbstract
To date, for solving the integrity provision problem of broad utilization, we received protocols of authentication and digital signature. Amongst them, protocols of the parties to interaction hold an important place, when a checkup of the fact that the interacting party is the self-identified party, is conducted by one party. The existing authentication methods are based mainly on operations of exponentiation, requiring implementation of complex calculations, affecting the speed of the method at the stage of its practical implementation. We consider a possibility of creating an authentication method of the interaction parties based on the mathematical apparatus of recurrent sequences, based on the proportions in which the initial elements are associated with the coefficients. We have worked out a protocol implementing the method. The proposed method, compared with the known analogues, allowed to increase the cryptographic reliability of the authentication process, and the ability to change the reliability of the method depending on the sequence order. The presented developments made it possible to expand the use of authentication methods, especially in protection systems with high level of secrecy.
References
Введение в криптографию [Текст] / под общ. РЄД.
B. Б. Ященко. — М.: МЦНМО: «ЧеРо», 2000. - 236 с.
Основы криптографии [Текст] / А. П. Алферов, А. Ю. Зубов, А. С. Кузьмин, А. В. Черемушкин. — М: Гелиос АРВ, 2001. — 480 с.
Петров, А. А. Компьютерная безопасность. Криптографические методы защиты [Текст] / А. А. Петров. — М.: ДМК, 2000. — 448 с.
Романец, Ю. В. Защита информации в компьютерных системах и сетях [Текст] / Ю. В. Романец, П. А. Тимофеева, В. Ф. Шаньгин. — М.: Радио и связь, 2001. — 376 с.
Яремчук, Ю. Є. Використання рекурентних послідовностей для побудови криптографічних методів з відкритим ключем [Текст] / Ю. Є. Яремчук // Захист інформації. — 2012. — №4. — C. 120—127.
Яремчук, Ю. Є. Метод автентифікації сторін взаємодії на основі рекурентних послідовностей [Текст] / Ю.Є. Яремчук // Сучасний захист інформації. — 2013. — №1. — С. 4—10.
Brassard, G. Modern Cryptology: A Tutorial [Текст] / G. Brassard. — Springer-Verlag, 1988. — 107 p.
Menezes, A. J. Handbook of Applied Cryptography [Текст] / A. J. Menezes, P. C. van Oorschot, S. A. Vanstone. — CRC Press, 2001. — 816 p.
Simmons, G. J. Authentication theory/coding theory [Текст] / G. J. Simmons // Proc. CRYPTO'84, Lect. Notes in Comput. Sci. — 1985. — V. 196. — Pp. 411-431.
Van Tilborg, Henk C.A. Fundamentals of cryptology. A Professional Reference and Interactive Tutorial [Текст] / Henk C.A. van Tilborg. — Kluwer Academic Publishers, 2000. — 512 p.
Yaschenko, V.B. (ed.) (2000) Introduction to cryptography. Moscow: MCNMO.
Alferov, A.P. et al. (2001) Cryptography basics. Moscow: Gelios ARV.
Petrov, A.A. (2000) Computer safety. Cryptographic methods of protection. Moscow: DMK.
Romanets, Yu.V. and Timofeeva, P.A. Information security in computer systems and networks. Moscow: Radio and Communications.
Iaremchuk, I.E. (2012). Use of recurrent sequences to construct cryptographic methods with the public key. Information Security, No. 4, pp. 120-127.
Iaremchuk, I.E. (2013). The method of authentication of parties of interaction based on recurrent sequences. Modern Information Security, No. 1, pp. 4-10.
Brassard, G. (1988) Modern Cryptology: A Tutorial. Springer-Verlag.
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A. (2001). Handbook of Applied Cryptography. CRC Press.
Simmons, G. J. (1985) Authentication theory/coding theory. Proceedings of CRYPTO'84, Lecture Notes in Computer Science, V. 196, pp. 411-431.
Van Tilborg, Henk C.A. (2000). Fundamentals of cryptology. A Professional Reference and Interactive Tutorial. Kluwer Academic Publishers.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.