{"id":2002,"date":"2021-01-18T18:28:22","date_gmt":"2021-01-18T16:28:22","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=2002"},"modified":"2021-04-14T14:18:34","modified_gmt":"2021-04-14T11:18:34","slug":"%d0%b4%d0%be%d1%81%d0%bb%d1%96%d0%b4%d0%b6%d0%b5%d0%bd%d0%bd%d1%8f-%d0%bc%d0%be%d0%b6%d0%bb%d0%b8%d0%b2%d0%be%d1%81%d1%82%d1%96-%d0%b2%d0%b8%d0%ba%d0%be%d1%80%d0%b8%d1%81%d1%82%d0%b0%d0%bd%d0%bd-2","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=2002","title":{"rendered":"\u0414\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u043c\u043e\u0436\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u0446\u0438\u043a\u043b\u0456\u0447\u043d\u043e\u0433\u043e \u043d\u0430\u0434\u043b\u0438\u0448\u043a\u043e\u0432\u043e\u0433\u043e \u043a\u043e\u0434\u0443 \u0434\u043b\u044f \u043f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043d\u044f \u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456 \u043a\u0440\u0438\u043f\u0442\u043e\u0441\u0445\u0435\u043c\u0438 ecies"},"content":{"rendered":"<p style=\"text-align: center;\">\u0414\u041e\u0421\u041b\u0406\u0414\u0416\u0415\u041d\u041d\u042f \u041c\u041e\u0416\u041b\u0418\u0412\u041e\u0421\u0422\u0406 \u0412\u0418\u041a\u041e\u0420\u0418\u0421\u0422\u0410\u041d\u041d\u042f \u0410\u041b\u0413\u041e\u0420\u0418\u0422\u041c\u0423 \u0426\u0418\u041a\u041b\u0406\u0427\u041d\u041e\u0413\u041e \u041d\u0410\u0414\u041b\u0418\u0428\u041a\u041e\u0412\u041e\u0413\u041e \u041a\u041e\u0414\u0423 \u0414\u041b\u042f \u041f\u0406\u0414\u0412\u0418\u0429\u0415\u041d\u041d\u042f \u0421\u0422\u0406\u0419\u041a\u041e\u0421\u0422\u0406 \u041a\u0420\u0418\u041f\u0422\u041e\u0421\u0425\u0415\u041c\u0418 ECIES<\/p>\n<p style=\"text-align: center;\">INVESTIGATION OF THE POSSIBILITY OF USING OF THE CYCLIC REDUNDANCY CODE ALGORITHM FOR THE INCREASE OF THE ECIES CRYPTOSCHEME STABILITY<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/24-10.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 155-161. \u041d\u043e\u043c\u0435\u0440: \u21161, 2019 (269)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0410.\u0412. \u041f\u0420\u0418\u0419\u041c\u0410\u041a, \u041e.\u0412. \u0421\u0410\u041b\u0406\u0404\u0412\u0410, \u042f.\u042e. \u042f\u0420\u0415\u041c\u0427\u0423\u041a<br \/>\n\u0412\u0456\u043d\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nA.V. PRYIMAK, O. V. SALIEVA, Y.Y. YAREMCHUK<br \/>\nVinnytsia National Technical University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2019-269-1-155-161\">https:\/\/www.doi.org\/10.31891\/2307-5732-2019-269-1-155-161<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 27.01.2019 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 16.02.2019 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u0440\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0430\u0441\u0438\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u043e\u0457 \u043a\u0440\u0438\u043f\u0442\u043e\u0441\u0445\u0435\u043c\u0438 ECIES \u0434\u043e \u0430\u0442\u0430\u043a\u0438 \u043c\u0430\u043b\u0438\u043c\u0438 \u043f\u0456\u0434\u0433\u0440\u0443\u043f\u0430\u043c\u0438, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043e \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u0446\u0438\u043a\u043b\u0456\u0447\u043d\u043e\u0433\u043e \u043d\u0430\u0434\u043b\u0438\u0448\u043a\u043e\u0432\u043e\u0433\u043e \u043a\u043e\u0434\u0443 \u0434\u043b\u044f \u043f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043d\u044f \u0457\u0457 \u043a\u0440\u0438\u043f\u0442\u043e\u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456. \u0420\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e \u043c\u0435\u0442\u043e\u0434 \u043f\u0435\u0440\u0435\u0432\u0456\u0440\u043a\u0438 \u043f\u0443\u0431\u043b\u0456\u0447\u043d\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430 \u043d\u0430 \u0441\u043f\u0440\u0430\u0432\u0436\u043d\u0456\u0441\u0442\u044c, \u044f\u043a\u0438\u0439 \u0443\u043d\u0435\u043c\u043e\u0436\u043b\u0438\u0432\u043b\u044e\u0454 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043d\u044f \u0443\u0441\u043f\u0456\u0448\u043d\u043e\u0457 \u0430\u0442\u0430\u043a\u0438 \u043c\u0430\u043b\u0438\u043c\u0438 \u043f\u0456\u0434\u0433\u0440\u0443\u043f\u0430\u043c\u0438 \u0456 \u044f\u043a \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442 \u0437\u043d\u0430\u0447\u043d\u043e \u043f\u0456\u0434\u0432\u0438\u0449\u0443\u0454 \u0442\u0435\u043e\u0440\u0435\u0442\u0438\u0447\u043d\u0443 \u0441\u0442\u0456\u0439\u043a\u0456\u0441\u0442\u044c \u0434\u0430\u043d\u043e\u0433\u043e \u043a\u0440\u0438\u043f\u0442\u043e\u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443. \u041f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0435 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0435 \u0442\u0435\u0441\u0442\u0443\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0457 \u043c\u043e\u0434\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u043f\u043e\u043a\u0430\u0437\u0430\u043b\u043e \u0434\u043e\u0431\u0440\u0443 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0443 \u0441\u0442\u0456\u0439\u043a\u0456\u0441\u0442\u044c, \u043e\u0441\u043a\u0456\u043b\u044c\u043a\u0438 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0438 \u0442\u0435\u0441\u0442\u0456\u0432 \u043d\u0435 \u0432\u0438\u0445\u043e\u0434\u044f\u0442\u044c \u0437\u0430 \u043c\u0435\u0436\u0456 0.9\u20131. \u0422\u0430\u043a \u044f\u043a \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u0454 \u0434\u043e\u0434\u0430\u0442\u043a\u043e\u0432\u0438\u043c \u043c\u043e\u0434\u0443\u043b\u0435\u043c \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443, \u0442\u043e \u0430\u043d\u0430\u043b\u0456\u0437 \u0448\u0432\u0438\u0434\u043a\u043e\u0434\u0456\u0457 \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u043e\u0432\u0430\u043d\u043e \u043f\u043e\u043a\u0430\u0437\u0430\u0432 \u043d\u0435\u0437\u043d\u0430\u0447\u043d\u0435 \u0443\u043f\u043e\u0432\u0456\u043b\u044c\u043d\u0435\u043d\u043d\u044f \u0440\u043e\u0431\u043e\u0442\u0438 \u043a\u0440\u0438\u043f\u0442\u043e\u0441\u0445\u0435\u043c\u0438 ECIES.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456\u00a0\u0441\u043b\u043e\u0432\u0430:<\/strong> \u0446\u0438\u043a\u043b\u0456\u0447\u043d\u0438\u0439 \u043d\u0430\u0434\u043b\u0438\u0448\u043a\u043e\u0432\u0438\u0439 \u043a\u043e\u0434, \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u044f, \u043a\u0440\u0438\u043f\u0442\u043e\u0441\u0442\u0456\u0439\u043a\u0456\u0441\u0442\u044c, ECIES, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u0430 \u0441\u0443\u043c\u0430.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The problem of vulnerability of the asymmetric cryptoscheme ECIES to the small subgroups attack is considered, as well as the possibility of using an algorithm of cyclic redundancy code to increase its cryptostability. A method of checking the public key for authenticity is developed that makes it impossible to conduct a successful small subgroups attack, and as a result significantly increases the theoretical stability of this cryptographic algorithm. The essence of the modification is that when generating a public key, the checksum is automatically calculated for it. After exchanging keys, each user generates a check sum of his own public key. This checksum is added to the optional parameter when calculating the message tag using the MAC function. After receiving the message and verifying its tag, it is concluded that all the parameters that participated in its generation are identical. If the checksums do not coincide as a result of a public key substitution, the message tag will also be changed. In this case, it is concluded that the public key of one of the interlocutors has been changed during the exchange and the continued exchange of information with these public keys is dangerous and need to be replaced. The performed statistical testing of the proposed modification of the algorithm showed good statistical stability, since the results of the tests do not exceed 0.9-1, however, generally, both versions showed almost the same results in tests.<br \/>\n<strong>Keywords:<\/strong> cyclic redundancy code, cryptography, cryptoscope, ECIES, checksum.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Setiadi I. Elliptic curve cryptography: Algorithms and implementation analysis over coordinate systems \/ I. Setiadi, A. Kistijantoro, A. Miyaji \/\/ 2015 2nd International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA), Chonburi. \u2013 2015. \u2013 \u0421. 1\u20136.<\/li>\n<li>Gayoso Mart\u00ednez V. A Survey of the Elliptic Curve Integrated Encryption Scheme \/ V. Gayoso Mart\u00ednez, L. Hern\u00e1ndez Encinas, C. S\u00e1nchez \u00c1vila \/\/ JOURNAL OF COMPUTER SCIENCE AND ENGINEERING. \u2013 2010. \u2013 \u21162. \u2013 \u0421. 7\u201313.<\/li>\n<li>Manali Dubal. Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture \/ Ms. Manali Dubal, Ms. Aaradhana Deshmukh \/\/ International Journal of Computer Applications (0975 \u2013 8887). \u2013 2014. \u2013 \u211624. \u2013 \u0421. 11\u201315.<\/li>\n<li>A comparison of the standardized versions of ECIES \/ V. Gayoso Mart\u00ednez, F. Hern\u00e1ndez, \u00c1. lvarez, L. Hern\u00e1ndez Encinas, C. S\u00e1nchez \u00c1 vila \/\/ 2010 Sixth International Conference on Information Assurance and Security, Atlanta, GA. \u2013 2010. \u2013 \u0421. 1\u20134.<\/li>\n<li>Koffka K. The Security of Elliptic Curve Cryptosystems &#8211; A Survey \/ Khan Koffka \/\/ Global Journal of Computer Science and Technology. \u2013 2015. \u2013 \u21165. \u2013 \u0421. 24\u201335.<\/li>\n<li>Integrated Encryption Scheme \/\/ Wikipedia. \u2013 2016. URL: https:\/\/en.wikipedia.org\/wiki\/Integrated_Encryption_Scheme.<\/li>\n<li>Krishnaveni V. Analysis of Efficient CRC Implementation Configurations \/ V. Krishnaveni, S. V.V.N., N.J.Lakshmi \/\/ International Journal of Engineering In Advanced Research Science and Technology ISSN: 2278-256. \u2013 2016. \u2013 \u21164. \u2013 \u0421. 7880\u20137888.<\/li>\n<li>Pareschi F. On Statistical Tests for Randomness Included in the NIST SP800-22 Test Suite and Based on the Binomial Distribution \/ F. Pareschi, R. Rovatti, G. Setti \/\/ IEEE Transactions on Information Forensics and Security. \u2013 2012. \u2013 \u21162. \u2013 \u0421. 491\u2013505.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0414\u041e\u0421\u041b\u0406\u0414\u0416\u0415\u041d\u041d\u042f \u041c\u041e\u0416\u041b\u0418\u0412\u041e\u0421\u0422\u0406 \u0412\u0418\u041a\u041e\u0420\u0418\u0421\u0422\u0410\u041d\u041d\u042f \u0410\u041b\u0413\u041e\u0420\u0418\u0422\u041c\u0423 \u0426\u0418\u041a\u041b\u0406\u0427\u041d\u041e\u0413\u041e \u041d\u0410\u0414\u041b\u0418\u0428\u041a\u041e\u0412\u041e\u0413\u041e \u041a\u041e\u0414\u0423 \u0414\u041b\u042f \u041f\u0406\u0414\u0412\u0418\u0429\u0415\u041d\u041d\u042f \u0421\u0422\u0406\u0419\u041a\u041e\u0421\u0422\u0406 \u041a\u0420\u0418\u041f\u0422\u041e\u0421\u0425\u0415\u041c\u0418 ECIES INVESTIGATION OF THE POSSIBILITY OF USING OF THE CYCLIC REDUNDANCY CODE ALGORITHM FOR THE INCREASE OF THE ECIES CRYPTOSCHEME STABILITY \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 155-161. \u041d\u043e\u043c\u0435\u0440: \u21161, 2019 (269) \u0410\u0432\u0442\u043e\u0440\u0438: \u0410.\u0412. \u041f\u0420\u0418\u0419\u041c\u0410\u041a, \u041e.\u0412. \u0421\u0410\u041b\u0406\u0404\u0412\u0410, \u042f.\u042e. \u042f\u0420\u0415\u041c\u0427\u0423\u041a \u0412\u0456\u043d\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 A.V. PRYIMAK, O. V. SALIEVA, Y.Y. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[21],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2002"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2002"}],"version-history":[{"count":4,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2002\/revisions"}],"predecessor-version":[{"id":5744,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2002\/revisions\/5744"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}