id: 36749
Title: Multi-party protocol for agreement of shared secret permutations-keys of significant dimension with their isomorphic representations
Authors: Krasilenko V.G., Nikitovich D.V., Tytarchuk Y.O.,
Keywords: cooperative secret key agreement protocol, matrix models, isomorphic permutation keys, cryptograms, cryptographic transformation
Date of publication: 2024-07-29 11:17:30
Last changes: 2024-07-29 11:17:30
Year of publication: 2024
Summary: The processes of generating large-dimension permutation matrices and their matrix powers, including in their new isomorphic spaces, are examined, along with their features and advantages for modeling a protocol for the agreement of a main cooperative secret key-permutation by a group of participants. Operations of multiple permutations are proposed instead of raising the corresponding permutation matrices to powers, which are the basic procedures of the proposed cooperative protocol for agreeing on a common secret key-permutation, formed and transmitted in its isomorphic representation. The proposed accelerated methods of raising permutations to significant powers have been verified. The results of modeling the cooperative protocol for the agreement of the secret key-permutation, its algorithmic steps, and operations have demonstrated the adequacy and advantages of isomorphic representations for describing and functioning processes of matrix models and the proposed protocol. Additionally, the results show that the proposed protocol significantly enhances computational efficiency and security, effectively preventing brute-force attacks even with high-dimensional keys. The practical implications of this work include improved secure communications in distributed systems and potential applications in fields requiring robust cryptographic methods, such as cybersecurity, data protection, and secure communications in IoT networks. The study demonstrated that isomorphic representations of permutation matrices not only provide high cryptographic strength but also significantly accelerate computational processes, which is critical for applications requiring real-time processing of large data volumes. The verification of the proposed methods confirms their effectiveness and reliability in various usage scenarios.
URI: http://repository.vsau.vin.ua/repository/getfile.php/36749.pdf
Publication type: Статті у наукових фахових виданнях України (Copernicus та інші)
Publication: Наука і техніка сьогодні. 2024. № 6 (34). С. 689-703. URL: http://perspectives.pp.ua/index.php/nts/article/view/12701/12763 DOI: https://doi.org/10.52058/2786-6025-2024-6(34)-689-703
In the collections :
Published by: Адміністратор
File : 36749.pdf Size : 1572553 byte Format : Adobe PDF Access : For all
| |
|
|