Skip to main content
Log in

Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces

  • Automatic Control Systems
  • Published:
Automation and Remote Control Aims and scope Submit manuscript

Abstract

New algebraic structures differing from the existing ones in new kinds of operations over finite sets of m-dimensional vectors (m ≥ 2) with discrete components were developed to construct information authentication algorithms for the automatic control systems. The operation of vector multiplication including multiplication and summation of the coordinates of the multiplied vectors modulo simple number p was defined. Depending on the structure of module p, dimensionality m, and value of the “extension” coefficients defined in terms of the rules of multiplication of the base vectors, the vector spaces were shown to include high-order finite groups or be extended fields that can be efficiently used to construct effective algorithms of electronic digital signature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Buchmann, J., Introduction to Cryptography, Berlin: Springer, 2003.

    Google Scholar 

  2. Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code, New York: Wiley, 1996.

    MATH  Google Scholar 

  3. Smart, N., Cryptography: An Introduction, New York: McGraw-Hill, 2002. Translated under the title Mir programmirovaniya: kriptografiya, Moscow: Tekhnosfera, 2005.

    Google Scholar 

  4. Pieprzyk, J., Hardjono, Th., and Seberry, J., Fundamentals of Computer Security, Berlin: Springer, 2003.

    MATH  Google Scholar 

  5. Menezes, A.J., Van Oorschot, P.C., and Vanstone, S.A., Handbook of Applied Cryptography, Boca Raton: CRC Press, 1997.

    MATH  Google Scholar 

  6. Koblitz, N., A Course in Number Theory and Cryptography, Berlin: Springer, 2003.

    Google Scholar 

  7. van der Waerden, B.L., Algebra I, Berlin: Springer, 1971. Algebra II, Berlin: Springer, 1967. Translated under the title Algebra, Moscow: Nauka, 1976.

    MATH  Google Scholar 

  8. Kurosh, A.G., Kurs vysshei algebry (Course of Higher Algebra), Moscow: Nauka, 1971.

    Google Scholar 

  9. Moldovyan, N.A. and Moldovyan, D.N., Method of Generation and Authentication of Electronic Digital Signature Certifying an Electronic Document, RF Patent Application no. 2007147826 of December 25, 2007.

  10. Schnorr, C.P., Efficient Signature Generation by Smart Cards, J. Cryptology, 1991, vol. 4, pp. 161–174.

    Article  MATH  MathSciNet  Google Scholar 

  11. Pointcheval, D. and Stern, J., Security Arguments for Digital Signatures and Blind Signatures, J. Cryptology, 2000, vol. 13, pp. 361–396.

    Article  MATH  Google Scholar 

  12. Koblitz, N. and Menezes, A.J., Another Look at “Provable Security,” J. Cryptology, 2007, vol. 20, pp. 3–38.

    Article  MATH  MathSciNet  Google Scholar 

  13. Moldovyan, A.A. and Moldovyan, N.A., New Algorithms and Protocols for Information Authentication in Automatic Control Systems, Avtom. Telemekh., 2008, no. 7, pp. 157–169.

  14. Moldovyan, N.A., Praktikum po kriptosistemam s otkrytym klyuchom (PracticalWork on Cryptosystems with Public Key), St. Petersburg: BKHV-Peterburg, 2007.

    Google Scholar 

  15. Int. Standard ISO/IEC 14888-3:2006(E). Information technology—Security techniques—Digital Signatures with appendix—Part 3: Discrete logarithm based mechanisms. (www.iso.org/iso/isocatalogue/cataloguetc).

Download references

Author information

Authors and Affiliations

Authors

Additional information

This work was supported by the Russian Foundation for Basic Research, project no. 08-07-00096-a.

Original Russian Text © N.A. Moldovyan, 2008, published in Avtomatika i Telemekhanika, 2008, No. 12, pp. 163–177.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Moldovyan, N.A. Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces. Autom Remote Control 69, 2142–2155 (2008). https://doi.org/10.1134/S0005117908120114

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0005117908120114

PACS numbers

Navigation