Mathematical model of information security systems based on Diophantine sets
Čebyševskij sbornik, Tome 15 (2014) no. 1, pp. 146-154

Voir la notice de l'article provenant de la source Math-Net.Ru

Development of the asymmetric cryptography started with the appearance of the first knapsack information protection system, when, in 1978, Ralph Merkel and Martin Hellman proposed to use different keys for forward and reverse mapping data for encryption. Now this model, like many based on are considered to be insecure. As a result the authority of knapsack systems was low. However, some of these systems are still considered persistent, for example, the model proposed in 1988 by Ben Shore and Ronald Rivest. In the article stated and solved the problem of argumentation of cryptographic strength of the non-standard knapsack information security systems. Justified diophantine difficulties that arise in the study of vulnerabilities of the investigated information security systems. Revealed the qualitative features of non-standard knapsack systems that increase their resistance to known attacks. In this paper, we propose a mathematical model of polyalphabetic cryptosystem, in which the algorithm of inverse transformation of closed text is algorithmically unsolvable problem for the analyst. It's permeated with the idea K. Shennon, who believed that cryptosystems, containing Diophantine problems, have the greatest variation in the selection of key.
Keywords: knapsack information security system; resistance of algorithm; diophantine difficulties; knapsack algorithm; knapsack vector; plain text; key; ciphertext.
@article{CHEB_2014_15_1_a13,
     author = {V. O. Osipyan and A. V. Mirzayan and Y. A. Karpenko and A. S. Zhuk and A. H. Arutyunyan},
     title = {Mathematical model of information security systems based on {Diophantine} sets},
     journal = {\v{C}eby\v{s}evskij sbornik},
     pages = {146--154},
     publisher = {mathdoc},
     volume = {15},
     number = {1},
     year = {2014},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/CHEB_2014_15_1_a13/}
}
TY  - JOUR
AU  - V. O. Osipyan
AU  - A. V. Mirzayan
AU  - Y. A. Karpenko
AU  - A. S. Zhuk
AU  - A. H. Arutyunyan
TI  - Mathematical model of information security systems based on Diophantine sets
JO  - Čebyševskij sbornik
PY  - 2014
SP  - 146
EP  - 154
VL  - 15
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/CHEB_2014_15_1_a13/
LA  - ru
ID  - CHEB_2014_15_1_a13
ER  - 
%0 Journal Article
%A V. O. Osipyan
%A A. V. Mirzayan
%A Y. A. Karpenko
%A A. S. Zhuk
%A A. H. Arutyunyan
%T Mathematical model of information security systems based on Diophantine sets
%J Čebyševskij sbornik
%D 2014
%P 146-154
%V 15
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/CHEB_2014_15_1_a13/
%G ru
%F CHEB_2014_15_1_a13
V. O. Osipyan; A. V. Mirzayan; Y. A. Karpenko; A. S. Zhuk; A. H. Arutyunyan. Mathematical model of information security systems based on Diophantine sets. Čebyševskij sbornik, Tome 15 (2014) no. 1, pp. 146-154. http://geodesic.mathdoc.fr/item/CHEB_2014_15_1_a13/