Abo Bibliothek: Guest
Digitales Portal Digitale Bibliothek eBooks Zeitschriften Referenzen und Berichte Forschungssammlungen
Telecommunications and Radio Engineering
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN Druckformat: 0040-2508
ISSN Online: 1943-6009

Volumes:
Volumen 78, 2019 Volumen 77, 2018 Volumen 76, 2017 Volumen 75, 2016 Volumen 74, 2015 Volumen 73, 2014 Volumen 72, 2013 Volumen 71, 2012 Volumen 70, 2011 Volumen 69, 2010 Volumen 68, 2009 Volumen 67, 2008 Volumen 66, 2007 Volumen 65, 2006 Volumen 64, 2005 Volumen 63, 2005 Volumen 62, 2004 Volumen 61, 2004 Volumen 60, 2003 Volumen 59, 2003 Volumen 58, 2002 Volumen 57, 2002 Volumen 56, 2001 Volumen 55, 2001 Volumen 54, 2000 Volumen 53, 1999 Volumen 52, 1998 Volumen 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v78.i5.40
pages 419-427

ANALYSIS OF THE IMPLEMENTATION COMPLEXITY OF CRYPTOSYSTEM BASED ON THE SUZUKI GROUP

G. Z. Khalimov
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine
E. V. Kotukh
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine
Yu. O. Serhiychuk
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine
O. S. Marukhnenko
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine

ABSTRAKT

Implementations for cryptosystems of finite groups based on the logarithmic signature and covering are considered. A logarithmic signature is exemplified by a permutation group with the asymmetry of encryption and decryption algorithms. Decryption of the improved cryptosystem MST3 in Suzuki 2-group with the order of the group q2 is given. The Suzuki 2-group use has a significant advantage in implementation, due to the large center and simple group operation. Cost estimates for encryption, decryption and comparison with the RSA algorithm are obtained.

REFERENZEN

  1. Wagner, N.R. and Magyarik, M.R., (1984) , A Public Key Cryptosystem Based on the Word Problem, Advances in Cryptology. Proceedings of CRYPTO, pp. 19-36, edited by G.R. Blakley and D. Chaum, Lecture Notes in Computer Science 196. Berlin: Springer, 1985.

  2. Wagner, N.R., (1984) , Searching for Public-Key Cryptosystems, Proceedings of the Symposium on Security and Privacy (SSP ’84), pp. 91-98, Los Alamitos, CA: IEEE Computer Society Press.

  3. Magliveras, S.S., (1986) , A Cryptosystem from Logarithmic Signatures of Finite Groups, Proceedings of the 29th Midwest Symposium on Circuits and Systems, pp. 972-975. Amsterdam: Elsevier Publishing Company.

  4. Lempken, W., Magliveras, S.S., Tran van Trung, and Wei, W. (2009), A public key cryptosystem based on non-abelian finite groups, J. of Cryptology, 22, pp. 62-74.

  5. Higman, G., (1963) , Suzuki 2-groups.Ill, J. Mathematic, 7, pp. 79-96.

  6. Pavol Svaba, (2011) , Covers and logarithmic signatures of finite groups in cryptography, Dissertation, Bratislava, Slowakische Republik.


Articles with similar content:

On Identification of Linear Stationary Systems
Journal of Automation and Information Sciences, Vol.40, 2008, issue 7
Alexander S. Apostolyuk, Vladimir B. Larin
Non-Classical Diffusion Boxes Using the Golden Binary Self-Similar Sequence
Telecommunications and Radio Engineering, Vol.56, 2001, issue 4&5
Ruben Vazquez-Medina, Hector Manuel Perez-Meana, Jose Luis Del-Rio-Correa
Non-Classical Diffusion Boxes Using the Golden Binary Self-Similar Sequence
Telecommunications and Radio Engineering, Vol.56, 2001, issue 1
Ruben Vazquez-Medina, Hector Manuel Perez-Meana, Jose Luis Del-Rio-Correa
ON HIDING DATA INTO THE STRUCTURE OF THE FAT FAMILY FILE SYSTEM
Telecommunications and Radio Engineering, Vol.78, 2019, issue 11
A.O. Kolhatin, A. A. Kuznetsov, K.Yu. Shekhanin, E.E. Demenko
Grapho-Analytical Calculation of Drying
Heat Transfer Research, Vol.29, 1998, issue 4-5
V. M. Minakovskii