Page 45 - ISCI’2017
P. 45
effective post-quantum algorithms for cryptographic protection [37], confirms this fact with a
historical retrospective.
This chapter includes the general theoretical basics of the algebraic coding and a description of
asymmetric cryptosystems based on these. Current state, existing contradictions and perspectives of
practical use of the asymmetric code cryptosystems during post-quantum period were been studied.
New crypto-transformation scheme, which significantly increases the relative data transfer rate, has
proposed by the authors. An advantage of the proposed scheme in comparison with already known
McEliece and Niederreiter schemes has shown [15, 16].
45