Building cryptographic schemes based on elliptic curves over rational numbers
Annotation
The possibility of using elliptic curves over the rational field of non-zero ranks in cryptographic schemes is studied. For the first time, the construction of cryptosystems is proposed the security of which is based on the complexity of solving the knapsack problem on elliptic curves over rational numbers of non-zero ranks. A new approach to the use of elliptic curves for cryptographic schemes is proposed. A few experiments have been carried out to estimate the heights characteristic of points on elliptic curves of infinite order. A model of a cryptosystem resistant to computations on a quantum computer and based on rational points of an infinite order curve is proposed. A study of the security and effectiveness of the proposed scheme has been carried out. An attack on the secret search in such a cryptosystem is implemented and it is shown that the complexity of the attack is exponential. The proposed solution can be applied in the construction of real cryptographic schemes as well as cryptographic protocols.
Keywords
Постоянный URL
Articles in current issue
- Investigation of congruent lithium niobate crystal dispersion properties in the terahertz frequency range
- Polarization extinction ratio in polarization maintaining fiber sealed with glass solder
- Method for remote control of radiation parameters of spacecraft based on X-ray fluorescence analysis
- Fiber-optic amplitude bend direction and magnitude sensor
- Compensation of external disturbances for MIMO systems with control delay
- An algorithm for generating design solutions for data and design-production procedures management at the stages of the lifecycle of an electronic product
- Karin S.A., Karin A.I.A method for improving the efficiency of integrated processing of Earth remote sensing data in solving problems of spatial objects monitoring
- Development of a model for detecting network traffic anomalies in distributed wireless ad hoc networks
- Applying the FN-corrector to improve the quality of audio event classification
- Strengthening the role of microarchitectural stages of embedded systems design
- A multivariate binary decision tree classifier based on shallow neural network
- Improvement and comparison the performance of fuzzing testing algorithms for applications in Google Thread Sanitizer
- A method for protecting neural networks from computer backdoor attacks based on the trigger identification
- Software development system for creation adaptive user interfaces
- Light weight recommendation system for social networking analysis using a hybrid BERT-SVM classifier algorithm
- A method of detecting information security incidents based on anomalies in the user’s biometric behavioral characteristics
- Modeling of random processes based on Karhunen-Loeve decomposition
- Numerical dissipation control of a hybrid large-particle method in vortex instability problems
- Numerical model of a pulsed subcritical streamer microwave discharge for problems of plasma ignition of fuel mixtures in the gas phase
- Numerical study on the straight, helical and spiral capillary tube for the CO2 refrigerant
- Information reconstruction from noisy channel using ghost imaging method with spectral multiplexing in visible range