THE METHOD OF CONSTRUCTING A NETHERWRITER CRYPTOSYSTEM BASED ON M-CODES

DOI: 10.31673/2409-7292.2025.031083

Authors

  • О. А. Лаптєв, (Laptev O.A.) Taras Shevchenko National University of Kyiv
  • В. О. Стеценко, (Stetsenko V.O.) National Technical University “Kharkiv Polytechnic Institute”

DOI:

https://doi.org/10.31673/2409-7292.2025.031083

Abstract

The article proposes a method for increasing the cryptoresistance of the Niederreiter cryptosystem by using M-codes –
algebrogeometric codes built on elliptic curves. The relevance of developing a mathematical apparatus for designing secure
information networks in the context of growing cyberthreats is substantiated. The purpose of the study is to develop approaches
to the system design of cryptosystems based on structural specifications. The Niederreiter crypto-code construction is
considered, the stability of which is based on the NP-complete problem of decoding a random linear code. The use of
algebrogeometric codes over GF(q) based on elliptic curves (genus g=1) is proposed, which provides improved combinatorial and asymptotic properties of codes. The mathematical apparatus for constructing a code verification matrix using geometric
parameters of curves is presented. It is shown that such an approach allows to increase the number of corrected errors and
increase noise immunity. An equilibrium coding algorithm for forming an error vector is also described. The proposed method
allows to determine the minimum number of processing modules, distribute functions between them and set performance
specifications, which significantly reduces the development time of protection systems. The results have practical significance
for creating survivable information networks, especially in conditions of intensive cyberattacks, in particular during wartime.
Keywords: information protection, cybersecurity, crypto-code system, coding, codegram, crypto-resistance.

References
1. Павлов І.М., Хорошко В.О. Проектування комплексних систем захисту інформації. К.: ВІТІ – ДУІКТ,
2011. 245 с.
2. Barabash O., Musienko A., Sobchuk V., Lukova-Chuiko N., Svynchuk O. Distribution of Values of Cantor
Type Fractal Functions with Specified Restrictions. Chapter in Book “Contemporary Approaches and Methods in
Fundamental Mathematics and Mechanics”. Editors Victor A. Sadovnichiy, Michael Z. Zgurovsky. Publisher Name:
Springer, Cham, Switzerland AG 2021. Р. 433-455. https://link.springer.com/book/10.1007/978-3-030-50302-4.
3. Barabash O.V., Dakhno N.B., Shevchenko H.V., Majsak T.V. Dynamic Models of Decision Support Systems
for Controlling UAV by Two-Step Variational-Gradient Method. Proceedings of 2017 IEEE 4th International Conference
“Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD)”, October 17-19, 2017, Kyiv, Ukraine:
National Aviation University, 2017. P. 108-111.
4. Лаптев О.А., Собчук В.В., Саланди И.П., Сачук Ю.В. Математична модель структури інформаційної
сеті на основі нестационарної іерархічної та стаціонарної гиперсети. Збірник наукових праць Військового
інституту Київського національного університету імені Тараса Шевченка. К.: ВІКНУ, Вип. 64, 2019. С. 124-132.
5. Lubov Berkman, Oleg Barabash, Olga Tkachenko , Andri Musienko, Oleksand Laptiev, Ivanna Salanda. The
Intelligent Control System for infocommunication networks. International Journal of Emerging Trends in Engineering
Research (IJETER) Volume 8. No. 5, May 2020. Scopus Indexed - ISSN 2347-3983. P.1920-1925.
6. Звіт ETSI Security Aspects of Channel Coding in 6G Systems (TR 103 756 V1.1.1). 2024.
7. Serhii Yevseiev, Khazail Rzayev, Oleksandr Laptiev, Ruslan Hasanov, Oleksandr Milov, Bahar Asgarova, Jale
Camalova, Serhii Pohasii. Development of a hardware cryptosystem based on a random number generator with two types
of entropy sources. Eastern-European journal of enterprise technologies. Vol.5 №9 (119). 2022 Р. 6–16. ISSN (print)
1729-3774. ISSN (on-line) 1729-4061. DOI: https://doi.org/10.15587/1729-4061.2022.265774.
8. Serhii Yevseiev, Khazail Rzayev, Oleksandr Laptiev, Ruslan Hasanov, Oleksandr Milov, Bahar Asgarova, Jale
Camalova, Serhii Pohasii. Development of a hardware cryptosystem based on a random number generator with two types
of entropy sources. Eastern-European journal of enterprise technologies. Vol.5 №9 (119). 2022 Р. 6–16. ISSN (print)
1729-3774. ISSN (on-line) 1729-4061. DOI: https://doi.org/10.15587/1729-4061.2022.265774.
9. F. K. Mammadov, “New approach to book cipher: web pages as a cryptographic key”, Advanced Information
Systems, vol. 7, no. 1, pp. 59–65, 2023, doi: https://doi.org/10.20998/2522-9052.2023.1.10.
10.S. Datsenko, and H. Kuchuk, “Biometric authentication utilizing convolutional neural networks”, Advanced
Information Systems, vol. 7, no. 2, pp. 87–91, 2023, doi: https://doi.org/10.20998/2522-9052.2023.2.12.
11.D. Salnikov, D. Karaman, and V. Krylova, “Highly reconfigurable soft-cpu based peripheral modules design”,
Advanced Information Systems, vol. 7, no. 2, pp. 92–97, 2023, doi: https://doi.org/10.20998/2522-9052.2023.2.13.
12.A. Podorozhniak, N. Liubchenko, V. Oliinyk, and V. Roh, “Research application of the spam filtering and
spammer detection algorithms on social media and messengers ”, Advanced Information Systems, vol. 7, no. 3, pp. 60-
66, 2023, doi: https://doi.org/10.20998/2522-9052.2023.3.09.

Published

2025-10-25

Issue

Section

Articles