Please use this identifier to cite or link to this item: https://er.chdtu.edu.ua/handle/ChSTU/1152
Full metadata record
DC FieldValueLanguage
dc.contributor.authorФауре, Еміль Віталійович-
dc.contributor.authorЩерба, Анатолій Іванович-
dc.contributor.authorВасіліу, Євген Вікторович-
dc.contributor.authorФесенко, Андрій Олексійович-
dc.date.accessioned2020-08-31T12:24:00Z-
dc.date.available2020-08-31T12:24:00Z-
dc.date.issued2020-
dc.identifier.issn1613-0073-
dc.identifier.urihttps://er.chdtu.edu.ua/handle/ChSTU/1152-
dc.description.abstractThe paper proposes a new cryptographic key exchange method. The basic idea of the proposed method is to use a permutation of a given set as a transformation object. The mathematical background of the method is the property of permutations to be decomposed into the product of disjoint cycles, the property of unique factorization of the product of disjoint cycles raised to the powers smaller than their order, and the complexity of factorization of the product of permutations whose cycles are noncommutative. The conditions to be met by the transformation parameters are defined. The concepts of cycle and block-noncommutative permutations are introduced. These properties of two permutations known to all participants in information exchange are sufficient for the correct operation of the method. The key space cardinality of the values of cycles’ exponents of two open permutations is investigated. It is shown that this cardinality is maximized if the disjoint cycles in the decomposition of open permutations are 3-cycles. The block diagram of a cryptographic system that implements the proposed method is investigated. Its work is described. The proposed method and system make it possible to generate a cryptographic key for information factorial coding without using a secure communication channel. They can also be used to form a non-permutation key.uk_UA
dc.language.isoenuk_UA
dc.publisherInternational Workshop on Cyber Hygiene (CybHyg-2019), Kyiv, Ukraine, November 30, 2019. CEUR Workshop Proceedings. Vol. 2654uk_UA
dc.subjectcryptographyuk_UA
dc.subjectmethoduk_UA
dc.subjectkey exchangeuk_UA
dc.subjectpermutationuk_UA
dc.subjectfactorial codinguk_UA
dc.titleCryptographic Key Exchange Method for Data Factorial Codinguk_UA
dc.typePublication in Conference Proceedingsuk_UA
dc.citation.spage643uk_UA
dc.citation.epage664uk_UA
Appears in Collections:Наукові публікації викладачів (ФІТІС)

Files in This Item:
File Description SizeFormat 
paper50.pdf584.48 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.