<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2021-7-4-119-127</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-218</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ТРУДЫ МОЛОДЫХ УЧЕНЫХ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>YOUNG SCHOLARS RESEARCH</subject></subj-group></article-categories><title-group><article-title>Безопасная передача информации при помощи двух методов бесключевой криптографии</article-title><trans-title-group xml:lang="en"><trans-title>Secure Information Transfer Using Two Keyless Cryptography Methods</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-9174-531X</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Герасимович</surname><given-names>А. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Gerasimovich</surname><given-names>A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>аспирант кафедры защищенных систем связи Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p><p>Санкт-Петербург, 193232, Российская Федерация</p></bio><bio xml:lang="en"><p>St. Petersburg, 193232, Russian Federation</p></bio><email xlink:type="simple">Alexgera93@gmail.com</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2021</year></pub-date><pub-date pub-type="epub"><day>29</day><month>12</month><year>2021</year></pub-date><volume>7</volume><issue>4</issue><fpage>119</fpage><lpage>127</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Герасимович А.С., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Герасимович А.С.</copyright-holder><copyright-holder xml:lang="en">Gerasimovich A.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/218">https://tuzs.sut.ru/jour/article/view/218</self-uri><abstract><p>В статье рассматриваются два протокола обеспечения информационной безопасности, использующие свойства каналов связи между пользователями. Первый из них основан на известном протоколе передачи конфиденциальных сообщений Шамира. Доказывается, что в нем может быть реализована криптосистема РША, но неприменимы такие криптосистемы, как Рабина, Мак-Элис, на решетках и потоковые шифры. Основное содержание статьи посвящено описанию второго протокола распределения ключей по постоянному и бесшумному каналу связи (типа Интернет). Доказано, что он может обеспечить высокую надежность распределения ключей и требуемый уровень их секретности в терминах Шенноновской информации, причем при отсутствии каких-либо дополнительных требований к каналам связи и безо всяких криптографических предположений.</p></abstract><trans-abstract xml:lang="en"><p>In the current paper, some methods of information security protocols based on physical layer security are considered. It is proved that well known Shamir’s protocol can be applied to RSA cryptosystem but not to Rabin, Mac-Ellice and trellis based cryptosystems.</p><p>The main stream of this paper is a description of key sharing protocol on constant public and noiseless channels (like Internet). It is shown that it is able to provide a high reliability and control of security in terms of Shannon’s information providing nothing-additional requirements to communication channels and without any cryptographic assumptions.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>криптосистемы с открытым ключом</kwd><kwd>распределение ключей</kwd><kwd>безопасность на физическом уровне</kwd><kwd>усиление секретности</kwd><kwd>квантовые компьютеры</kwd><kwd>протоколы</kwd></kwd-group><kwd-group xml:lang="en"><kwd>public key cryptosystem</kwd><kwd>key distribution</kwd><kwd>Shannon’s information</kwd><kwd>privacy amplification</kwd><kwd>physical layer security quantum computers</kwd></kwd-group><funding-group xml:lang="ru"><funding-statement>Автор выражает благодарность профессору Коржику В.И. за помощь при подготовке и обсуждении работы.</funding-statement></funding-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Яковлев В.А. Основы криптографии. СПб: Интермедия, 2016. 312 с.</mixed-citation><mixed-citation xml:lang="en">Korzhik V.I., Yakovlev V.A. Fundamentals of Cryptography. St. Petersburg: Intermediia Publ.; 2016. 312 p. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Diffie W., Hellman M. New directions in cryptography // IEEE Transactions on Information Theory. 1976. Vol. 22. Iss. 6. PP. 644‒654. DOI:10.1109/TIT.1976.055638</mixed-citation><mixed-citation xml:lang="en">Diffie W., Hellman M. New directions in cryptography. IEEE Transactions on Information Theory. 1976;22(6):644‒654. DOI:10.1109/TIT.1976.1055638</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Dyakonov M.I. Is Fault-Tolerant Quantum Computation Really Possible? // In Luryi S., Xu J., Zaslavsky A. Future Trends in Microelectronics. John Wiley &amp; Sons, 2007. PP. 4‒18.</mixed-citation><mixed-citation xml:lang="en">Dyakonov M.I. Is Fault-Tolerant Quantum Computation Really Possible? In Luryi S., Xu J., Zaslavsky A. Future Trends in Microelectronics. John Wiley &amp; Sons; 2007. p.4‒18.</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Bennett C.H., Bessette F., Brassard G., Salvail L., Smolin J. Experimental Quantum Cryptography // Journal of Cryptology. 1992. Vol. 5. PP. 3‒28.</mixed-citation><mixed-citation xml:lang="en">Bennett C.H., Bessette F., Brassard G., Salvail L., Smolin J. Experimental Quantum Cryptography. Journal of Cryptology. 1992;5:3‒28</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Mukherjee A., Fakoorian S.A.A., Huang J., Swindlehurst A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey // IEEE Communications Surveys &amp; Tutorials. 2014. Vol. 16. Iss. 3. PP. 1550‒1573. DOI:10.1109/SURV.2014.012314.00178</mixed-citation><mixed-citation xml:lang="en">Mukherjee A., Fakoorian S.A.A., Huang J., Swindlehurst A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Communications Surveys &amp; Tutorials. 2014;16(3):1550‒1573. DOI:10.1109/SURV.2014.012314.00178</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Schneier B. Applied Cryptography. Montreal: JW Publ. Inc., 1994.</mixed-citation><mixed-citation xml:lang="en">Schneier B. Applied Cryptography. Montreal: JW Publ. Inc.; 1994</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Menezes A.J., van Oorschot P.C., Vanstone S.A. Handbook of Applied Cryptography. Boca Raton: CRC Press, 1997. DOI:10.1201/9780429466335</mixed-citation><mixed-citation xml:lang="en">Menezes A.J., van Oorschot P.C., Vanstone S.A. Handbook of Applied Cryptography. Boca Raton: CRC Press; 1997. DOI:10.1201/9780429466335</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Shor P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer // Proceedings of the 35th Annual Symposium on Foundations of Computer Science (Santa Fe, USA, 20–22 November 1994). IEEE Computer Society Press, 1994. PP. 124–134.</mixed-citation><mixed-citation xml:lang="en">Shor P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 20–22 November 1994, Santa Fe, USA. IEEE Computer Society Press; 1994. p.124–134.</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Goldreich O., Goldwasser S., Halevi S. Public–key cryptography from lattice reduction problems // Proceedings of the 17th Annual International Cryptology Conference (Santa Barbara, USA, 17–21 August 1997). Lecture Notes in Computer Science. Vol. 1291. Berlin, Heidelberg: Springer, 1997. PP. 112‒131. DOI:10.1007/BFb0052231</mixed-citation><mixed-citation xml:lang="en">Goldreich O., Goldwasser S., Halevi S. Public–key cryptography from lattice reduction problems. Proceedings of the 17th Annual International Cryptology Conference, 17–21 August 1997, Santa Barbara, USA. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1997. vol.1291. p.112‒131. DOI:10.1007/BFb0052231</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Alpern B., Schneider F.B. Key exchange using ‘keyless cryptography’ // Information Processing Letters. 1983. Vol. 16. Iss. 2. PP. 79‒81. DOI:10.1016/0020-0190(83)90029-7</mixed-citation><mixed-citation xml:lang="en">Alpern B., Schneider F.B. Key exchange using ‘keyless cryptography’. Information Processing Letters. 1983;16(2):79‒81. DOI:10.1016/0020-0190(83)90029-7</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Maurer U.M. Secrete key agreement by public discussion from common information // IEEE Transactions on Information Theory. 1993. Vol. 39. Iss. 3. PP. 733‒742. DOI:10.1109/18.256484</mixed-citation><mixed-citation xml:lang="en">Maurer U.M. Secrete key agreement by public discussion from common information. IEEE Transactions on Information Theory. 1993;39(3):733‒742. DOI:10.1109/18.256484</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Yakovlev V., Korzhik V., Morales-Luna G. Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions with Parameter Optimization // IEEE Transactions on Information Theory. 2008. Vol. 54. Iss. 6. PP. 2535‒2549. DOI:10.1109/TIT.2008.921689</mixed-citation><mixed-citation xml:lang="en">Yakovlev V., Korzhik V., Morales-Luna G. Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions with Parameter Optimization. IEEE Transactions on Information Theory. 2008;54(6):2535‒2549. DOI:10.1109/TIT.2008.921689</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Starostin V., Kabardov M., Gerasimovich A., Yakovlev V., Zhuvikin A. Protocol of key distribution over public noiseless channels executing without cryptographic assumptions // International Journal of Computer Science and Application. 2020. Vol. 17. Iss. 1. PP. 1‒14.</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Starostin V., Kabardov M., Gerasimovich A., Yakovlev V., Zhuvikin A. Protocol of key distribution over public noiseless channels executing without cryptographic assumptions. International Journal of Computer Science and Application. 2020;17(1):1‒14.</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Starostin V., Kabardov M., Gerasimovich A., Yakovlev V., Zhuvikin A. Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions // Proceedings of the 44th International Convention on Information, Communication and Electronic Technology (MIPRO, Opatija, Croatia, 27 September‒1 October 2021). IEEE, 2021. PP. 1202‒1207. DOI:10.23919/MIPRO52101.2021.9596703</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Starostin V., Kabardov M., Gerasimovich A., Yakovlev V., Zhuvikin A. Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions. Proceedings of the 44th International Convention on Information, Communication and Electronic Technology, MIPRO, 27 September‒1 October 2021, Opatija, Croatia. IEEE; 2021. p.1202‒1207. DOI:10.23919/MIPRO52101.2021.9596703</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V.I., Starostin V.S., Kabardov M.M., Gerasimovich A.M., Yakovlev V.A., Zhuvikin A.G. Information theoretically secure key sharing protocol executing with constant noiseless public channels // Matematicheskie Voprosy Kriptografii. 2021. Vol. 12. Iss. 3. PP. 125–141. DOI:10.4213/mvk378</mixed-citation><mixed-citation xml:lang="en">Korzhik V.I., Starostin V.S., Kabardov M.M., Gerasimovich A.M., Yakovlev V.A., Zhuvikin A.G. Information theoretically secure key sharing protocol executing with constant noiseless public channels. Matematicheskie Voprosy Kriptografii. 2021;12(3):125–141. DOI:10.4213/mvk378</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">MacKay D.J.C., Neal R.M. Near Shannon Limit Performance of Low Density Parity Check Codes // Electronics Letters. 1997. Vol. 33. Iss. 18. PP. 457–458.</mixed-citation><mixed-citation xml:lang="en">MacKay D.J.C., Neal R.M. Near Shannon Limit Performance of Low Density Parity Check Codes. Electronics Letters. 1997;33(18):457–458.</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Fossorier M. P.C., Mihaljevic M., Imai H. Reduced complexity iterative decoding of low density parity check codes based on belief propagation // IEEE Transactions on Communications 1999. Vol. 47. Iss. 5. PP. 673‒680. DOI:10.1109/26.768759</mixed-citation><mixed-citation xml:lang="en">Fossorier M. P.C., Mihaljevic M., Imai H. Reduced complexity iterative decoding of low density parity check codes based on belief propagation. IEEE Transactions on Communications. 1999;47(5):673‒680. DOI:10.1109/26.768759</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Korjik V., Morales-Luna G., Balakirsky V.B. Privacy Amplfication Theorem for Noisy Main Channel // Proceedings of the 4th International Conference on Information Security (ISC 2001, Malaga, Spain, 1–3 October 2001). Lecture Notes in Computer Science. Vol. 2200. Berlin, Heidelberg: Springer, 2001. PP. 18‒26. DOI:10.1007/3-540-45439-X_2</mixed-citation><mixed-citation xml:lang="en">Korjik V., Morales-Luna G., Balakirsky V.B. Privacy Amplfication Theorem for Noisy Main Channel. Proceedings of the 4th International Conference on Information Security, ISC 2001, 1–3 October 2001, Malaga, Spain. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2001. vol.2200. p.18‒26. DOI:10.1007/3-540-45439-X_2</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Подорожный И.В. Обзор аппаратных генераторов случайных чисел // Молодой ученый. 2015. № 1(105). URL: http://moluch.ru/archive/105/24688 (дата обращения 24.06.2020)</mixed-citation><mixed-citation xml:lang="en">Podorozhnyi I. V. Overview of Hardware Random Number Generators. Molodoy uchenyi. 2015;1(105). Available from: http://moluch.ru/archive/105/24688 [Accessed 24th June 2020] (In Rus.)</mixed-citation></citation-alternatives></ref><ref id="cit20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Needham R.M., Schroeder M.D. Using encryption for authentication in large network of computers // Communications of the ACM. 1978. Vol. 21. Iss. 12. PP. 993‒999. DOI:10.1145/359657.359659</mixed-citation><mixed-citation xml:lang="en">Needham R.M., Schroeder M.D. Using encryption for authentication in large network of computers. Communications of the ACM. 1978;21(12):993‒999. DOI:10.1145/359657.359659</mixed-citation></citation-alternatives></ref><ref id="cit21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">Jin R., Shi L., Zeng K., Pande A., Mohapatra P. MagPairing: Pairing Smartphones in Close Proximity Using Magnetometer // IEEE Transactions on Information Forensics and Security. 2016. Vol. 11. Iss. 6. PP. 1306‒1320. DOI:10.1109/TIFS.2015.2505626</mixed-citation><mixed-citation xml:lang="en">Jin R., Shi L., Zeng K., Pande A., Mohapatra P. MagPairing: Pairing Smartphones in Close Proximity Using Magnetometer // IEEE Transactions on Information Forensics and Security. 2016. Vol. 11. Iss. 6. PP. 1306‒1320. DOI:10.1109/TIFS.2015.2505626</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
