Three-stage permutation-based cryptographic protocol

Purpose. To increase the security of information exchange based on a three-stage cryptographic protocol.

Specifications. The three-stage cryptographic protocol can be implemented in various communication devices, including low-resource cryptography. For the three-stage protocol to work correctly, it is necessary to ensure that there are no errors in the permutation after receiving from the communication channel. The protocol was developed for information transmission systems that use non-divided factorial coding, but can also be adapted for traditional systems that do not use factorial code. In the latter case, the data transfer protocol must additionally include a procedure for bictive mapping of an information block into a permutation.

Application area. Communication system for secure communication. Telecommunication systems and networks. Information security systems. Potential consumers of the technology are manufacturers of communication equipment.

Advantages. Three-stage protocols based on the power-raising cipher are not secure against attacks using hypothetical quantum computers. The cryptographic transformation operations of the proposed protocol are the operations of multiplying permutations, raising to the powers of their extraordinary cycles, as well as the operation of searching for conjugate permutations. The stability of the transformation is based not only on the complexity of factorization of permutations, but also on the complexity of implementing transformations inverse to nonlinear operations based on the same cyclic structure of conjugate permutations.

Technical and economic effect. A three-stage permutation-based cryptographic protocol circumvents problems associated with discrete logarithms and improves the cryptographic strength of the protocol.

Description. The three-stage permutation-based cryptographic protocol is based on the complexity of permutation factorization and the complexity of implementing transformations inverse to nonlinear operations based on the identical cyclic structure of conjugate permutations.

More details…