Development of a protocol for a closed mobile internet channel based on post-quantum algorithms

The development of computing technologies has made it possible not only to expand the range of mobile communication services, but also to significantly increase computing capabilities. The emergence of mobile Internet, 4G, 5G technologies makes it possible to talk about a fundamentally different app...

Full description

Bibliographic Details
Main Authors: С.П. Євсєєв, С.С. Погасій, В.С. Хвостенко
Format: Article
Language:English
Published: Ivan Kozhedub Kharkiv National Air Force University 2021-09-01
Series:Системи обробки інформації
Subjects:
Online Access:https://journal-hnups.com.ua/index.php/soi/article/view/719
_version_ 1819039046695911424
author С.П. Євсєєв
С.С. Погасій
В.С. Хвостенко
author_facet С.П. Євсєєв
С.С. Погасій
В.С. Хвостенко
author_sort С.П. Євсєєв
collection DOAJ
description The development of computing technologies has made it possible not only to expand the range of mobile communication services, but also to significantly increase computing capabilities. The emergence of mobile Internet, 4G, 5G technologies makes it possible to talk about a fundamentally different approach to ensuring the quality of service to network customers, creating fundamentally new approaches to ensuring the efficiency and reliability of transmitted information flows. However, such a rapid growth of GSM technologies without the introduction of security services leads to active actions of attackers and cyber terrorists, the emergence of new and modification of known threats. Mobile communication channels are used by cybercriminals for selfish purposes of access to database resources not only of the mobile Internet, but also to the databases of information and communication systems and networks. The article proposes a fundamentally new approach to ensuring the closure of the voice channel of the mobile Internet based on post-quantum cryptography algorithms – McEliece and Niederreiter crypto-code constructions on elliptic codes. This approach provides not only the offline mode of closing the voice channel and creating a VPN channel in tunnel mode, but also the required level of cryptographic strength in the face of the emergence of full-scale quantum computers.
first_indexed 2024-12-21T08:46:59Z
format Article
id doaj.art-07f427b8cee24503995677fa31ec2929
institution Directory Open Access Journal
issn 1681-7710
2518-1696
language English
last_indexed 2024-12-21T08:46:59Z
publishDate 2021-09-01
publisher Ivan Kozhedub Kharkiv National Air Force University
record_format Article
series Системи обробки інформації
spelling doaj.art-07f427b8cee24503995677fa31ec29292022-12-21T19:09:47ZengIvan Kozhedub Kharkiv National Air Force UniversityСистеми обробки інформації1681-77102518-16962021-09-013(166)354010.30748/soi.2021.166.03719Development of a protocol for a closed mobile internet channel based on post-quantum algorithmsС.П. Євсєєв0С.С. Погасій1В.С. Хвостенко2Simon Kuznets Kharkiv National University of Economics, Kharkiv, UkraineSimon Kuznets Kharkiv National University of Economics, Kharkiv, UkraineSimon Kuznets Kharkiv National University of Economics, Kharkiv, UkraineThe development of computing technologies has made it possible not only to expand the range of mobile communication services, but also to significantly increase computing capabilities. The emergence of mobile Internet, 4G, 5G technologies makes it possible to talk about a fundamentally different approach to ensuring the quality of service to network customers, creating fundamentally new approaches to ensuring the efficiency and reliability of transmitted information flows. However, such a rapid growth of GSM technologies without the introduction of security services leads to active actions of attackers and cyber terrorists, the emergence of new and modification of known threats. Mobile communication channels are used by cybercriminals for selfish purposes of access to database resources not only of the mobile Internet, but also to the databases of information and communication systems and networks. The article proposes a fundamentally new approach to ensuring the closure of the voice channel of the mobile Internet based on post-quantum cryptography algorithms – McEliece and Niederreiter crypto-code constructions on elliptic codes. This approach provides not only the offline mode of closing the voice channel and creating a VPN channel in tunnel mode, but also the required level of cryptographic strength in the face of the emergence of full-scale quantum computers.https://journal-hnups.com.ua/index.php/soi/article/view/719post-quantum cryptoalgorithms, crypto-code constructions of mceliece and niederreiter, mobile internet, 4g, 5g technology.
spellingShingle С.П. Євсєєв
С.С. Погасій
В.С. Хвостенко
Development of a protocol for a closed mobile internet channel based on post-quantum algorithms
Системи обробки інформації
post-quantum cryptoalgorithms, crypto-code constructions of mceliece and niederreiter, mobile internet, 4g, 5g technology.
title Development of a protocol for a closed mobile internet channel based on post-quantum algorithms
title_full Development of a protocol for a closed mobile internet channel based on post-quantum algorithms
title_fullStr Development of a protocol for a closed mobile internet channel based on post-quantum algorithms
title_full_unstemmed Development of a protocol for a closed mobile internet channel based on post-quantum algorithms
title_short Development of a protocol for a closed mobile internet channel based on post-quantum algorithms
title_sort development of a protocol for a closed mobile internet channel based on post quantum algorithms
topic post-quantum cryptoalgorithms, crypto-code constructions of mceliece and niederreiter, mobile internet, 4g, 5g technology.
url https://journal-hnups.com.ua/index.php/soi/article/view/719
work_keys_str_mv AT spêvsêêv developmentofaprotocolforaclosedmobileinternetchannelbasedonpostquantumalgorithms
AT sspogasíj developmentofaprotocolforaclosedmobileinternetchannelbasedonpostquantumalgorithms
AT vshvostenko developmentofaprotocolforaclosedmobileinternetchannelbasedonpostquantumalgorithms