z-logo
open-access-imgOpen Access
Development of a protocol for a closed mobile internet channel based on post-quantum algorithms
Author(s) -
Сергій Євсєєв,
Сергій Погасій,
Vladyslav Khvostenko
Publication year - 2021
Publication title -
sistemi obrobki ìnformacìï
Language(s) - English
Resource type - Journals
eISSN - 2518-1696
pISSN - 1681-7710
DOI - 10.30748/soi.2021.166.03
Subject(s) - computer science , the internet , gsm , computer security , computer network , cryptography , world wide web
The development of computing technologies has made it possible not only to expand the range of mobile communication services, but also to significantly increase computing capabilities. The emergence of mobile Internet, 4G, 5G technologies makes it possible to talk about a fundamentally different approach to ensuring the quality of service to network customers, creating fundamentally new approaches to ensuring the efficiency and reliability of transmitted information flows. However, such a rapid growth of GSM technologies without the introduction of security services leads to active actions of attackers and cyber terrorists, the emergence of new and modification of known threats. Mobile communication channels are used by cybercriminals for selfish purposes of access to database resources not only of the mobile Internet, but also to the databases of information and communication systems and networks. The article proposes a fundamentally new approach to ensuring the closure of the voice channel of the mobile Internet based on post-quantum cryptography algorithms – McEliece and Niederreiter crypto-code constructions on elliptic codes. This approach provides not only the offline mode of closing the voice channel and creating a VPN channel in tunnel mode, but also the required level of cryptographic strength in the face of the emergence of full-scale quantum computers.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here