Page 44 - ISCI’2017
P. 44

Introduction


            Various cryptographic mechanisms are used to provide basic security services in modern information

            and telecommunication systems,  in particular, public-key (two-key) cryptosystems,  in which a
            problem of searching of secret key by public key connects to a solution of the well-known and hardest

            mathematical problem (factoring, discrete logarithmization, etc.) [1-3]. However, with the
            appearance of quantum computing  based on the quantum  mechanical principles,  in particular,

            superposition principle and quantum entanglement, a speed  of solution of some  mathematical

            problems is significantly increasing [4]. Some quantum algorithms exist, for example, Shor's, Grover,
            Deutsch–Jozsa, Simon’s algorithms, and another, an execution of which has far less time, than an

            execution of any probabilistic classical algorithm [5-11]. Shor's algorithms allow to find all simple
            multipliers of big numbers in a finite (and acceptable) time, or to solve a discrete logarithm problem.

            Consequently,  it allows to find a secret key of corresponding asymmetric cryptoalgorithm (RSA,
            ECC, etc.) [10]. Thus, development and theoretical justification of new cryptoalgorithms, in which a

            complexity of search of secret parameter by public key, remain high even take into account of possible

            using of the quantum computing (i.e. for  the post-quantum period), and is extremely  important
            scientific problem [12-14].



            Amount possible candidates for the post-quantum cryptography, the algorithms, building of which
            based on using of algebraic codes that are camouflaged on the common state code (random code,

            complete code), occupy a special place [15-18]. These similar algorithms are called theoretical-code
            schemes [19, 20], or crypto-codes transformations [21, 22] in Russian-languages literature. These

            crypto-codes transformations remain steadfast even in a case of quantum computing use along with
            a high speed of the crypto-transformations and  a possibility to combine an error checking and

            unauthorized familiarization protection [23]. Besides, todays different crypto-graphical primitives

            (asymmetrical  [15,  16,  18,  20]  and  symmetrical  [17]  encryption  algorithms,  pseudo-random
            sequences and stream encryption generators [24-26], zero-knowledge  proof  (protocols)  [27,  28],

            electronic digital signature schemes [29, 30], identification [31, 32], etc.) based on algebraic codes
            using, are already known. There is make this direction as universal tool, which allows to realize a

            wide range of effective cryptographic  information protection  mechanisms  based on unique
            mathematical and program software. Nevertheless, computationally efficient attacks  to separated

            variants of theoretical-code schemes [19, 33 - 36] are known, basic scheme [15], which has been

            proposed around 40 years ago, remains resistant to all well-known crypto-analysis methods.
            Reliability and perceptivity of the crypto-code transformations, especially in the context of building



            44
   39   40   41   42   43   44   45   46   47   48   49