2023
DOI: 10.15587/1729-4061.2023.281795
|View full text |Cite
|
Sign up to set email alerts
|

Development of an improved SSL/TLS protocol using post-quantum algorithms

Serhii Yevseiev,
Alla Havrylova,
Stanislav Milevskyi
et al.

Abstract: The development of Internet technologies together with mobile and computer technologies have formed smart technologies that allow the formation of both cyber-physical and socio-cyber-physical systems. The basis of smart technologies is the integration of wireless channel standards with mobile and computer protocols. 4G/5G technologies are integrated with various web platforms, taking into account the digitalization of services in cyberspace. But the SSL/TLS protocol, based on the hybridization of symmetric enc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…The research hypothesis was as follows. To provide security services in socio-cyberphysical systems (critical infrastructure objects), it is proposed to use post-quantum crypto-algorithms based on McEliece's crypto-code constructions [1][2][3][27][28][29][30][31][32][33]. The use of various noise-resistant codes makes it possible to ensure the required characteristics of both standard channels of information and communication systems and networks, and smart technology channels (wireless channels), as well as the transmission of various contexts (files, video, sound, etc.)…”
Section: Materials and Research Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…The research hypothesis was as follows. To provide security services in socio-cyberphysical systems (critical infrastructure objects), it is proposed to use post-quantum crypto-algorithms based on McEliece's crypto-code constructions [1][2][3][27][28][29][30][31][32][33]. The use of various noise-resistant codes makes it possible to ensure the required characteristics of both standard channels of information and communication systems and networks, and smart technology channels (wireless channels), as well as the transmission of various contexts (files, video, sound, etc.)…”
Section: Materials and Research Methodsmentioning
confidence: 99%
“…[34][35][36][37][38][39]. In addition, the research carried out [1][2][3][27][28][29][30][31][32][33][34][35][36][37][38][39] makes it possible to use various algebrogeometric codes, LDPC codes with defective codes, which makes it possible to build hybrid crypto-code constructions and provide the required efficiency and strength of confidential cryptography. The initial data for constructing such structures is the required parameters of durability and efficiency of transmitted information.…”
Section: Materials and Research Methodsmentioning
confidence: 99%
See 2 more Smart Citations