<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="review-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2024-10-6-79-98</article-id><article-id custom-type="edn" pub-id-type="custom">HPBOWG</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-643</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Прогресс в теории прикладной криптографии: обзор и некоторые новые результаты. Часть 2. Бесключевая криптография</article-title><trans-title-group xml:lang="en"><trans-title>Advance in Applied Cryptography Theory: Survey and Some New Results. Part 2. Keyless Cryptography</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-8347-6527</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Коржик</surname><given-names>В. И.</given-names></name><name name-style="western" xml:lang="en"><surname>Korzhik</surname><given-names>V. I.</given-names></name></name-alternatives><bio xml:lang="ru"><p>доктор технических наук, профессор, профессор кафедры защищенных систем связи Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">val-korzhik@yandex.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0007-2861-9605</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Яковлев</surname><given-names>В. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Yakovlev</surname><given-names>V. A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>доктор технических наук, профессор, профессор кафедры защищенных систем связи Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">yakovlev.va@sut.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0000-2939-1971</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Старостин</surname><given-names>В. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Starostin</surname><given-names>V. S.</given-names></name></name-alternatives><bio xml:lang="ru"><p>кандидат физико-математических наук, доцент, доцент кафедры высшей математики Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">vm.ffp@sut.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-8146-0022</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Буйневич</surname><given-names>М. В.</given-names></name><name name-style="western" xml:lang="en"><surname>Buinevich</surname><given-names>M. V.</given-names></name></name-alternatives><bio xml:lang="ru"><p>доктор технических наук, профессор, профессор кафедры прикладной математики и информационных технологий Санкт-Петербургского университета ГПС МЧС России</p></bio><email xlink:type="simple">bmv1958@yandex.ru</email><xref ref-type="aff" rid="aff-2"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М. А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">The Bonch-Bruevich Saint Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><aff-alternatives id="aff-2"><aff xml:lang="ru">Санкт-Петербургский университет ГПС МЧС России<country>Россия</country></aff><aff xml:lang="en">Saint Petersburg University of State Fire Service of Emercom of Russia<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2024</year></pub-date><pub-date pub-type="epub"><day>26</day><month>12</month><year>2024</year></pub-date><volume>10</volume><issue>6</issue><fpage>79</fpage><lpage>98</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Коржик В.И., Яковлев В.А., Старостин В.С., Буйневич М.В., 2024</copyright-statement><copyright-year>2024</copyright-year><copyright-holder xml:lang="ru">Коржик В.И., Яковлев В.А., Старостин В.С., Буйневич М.В.</copyright-holder><copyright-holder xml:lang="en">Korzhik V.I., Yakovlev V.A., Starostin V.S., Buinevich M.V.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/643">https://tuzs.sut.ru/jour/article/view/643</self-uri><abstract><p>Настоящая работа является второй частью статьи «Прогресс в теории прикладной криптографии: обзор и некоторые новые результаты», опубликованной в четвертом номере журнала ТУЗС за 2024 год. Она посвящена специфическому разделу так называемой бесключевой криптографии (БК). Актуальность данной статьи состоит в том, что рассматриваемые в ней методы позволяют обеспечить конфиденциальность передачи информации по открытым каналам связи, либо вообще не выполняя никакого предварительного ее шифрования, а эксплуатируя лишь преобразования, естественно происходящие в каналах связи, либо, применяя обычную (ключевую) криптографию, ключи для которой передаются по открытым каналам связи с использованием методов БК. </p><p>Настоящая работа начинается с описания вайнеровской концепции подслушивающего канала и методов кодирования в нем, обеспечивающих надежную передачу по основному каналу с гарантированным малым количеством шенноновской информации, утекающей по каналу перехвата. Далее исследуются сценарий с коммутативной криптографией (CE) и протокол, обеспечивающий конфиденциальность передачи информации без всякого обмена ключами. Следующая модель относится к многолучевому каналу и применению MIMO-технологии по протоколу Дина и Голдсмит. Доказывается, что для него секретность передачи обеспечивается только при ограничении на количество приемных антенн перехватчика.</p><p>Следующий сценарий использует технологию антенн с управляемой диаграммой (VDA), причем устанавливаются условия на многолучевость и расположение корреспондентов радиосвязи, при которых может быть обеспечена конфиденциальность передачи информации. </p><p>Анализируется также недавно предложенная криптосистема EVESkey. Доказывается, что существует простая атака, которая может нарушить ее конфиденциальность. </p><p>Описывается ряд протоколов, выполняемых по бесшумному открытому каналу, которые, однако, не являются стойкими, поскольку они имеют нулевую секретную пропускную способность. Доказывается, что при матричном обмене в канале связи типа Интернет, конфиденциальность может быть обеспечена только по критерию ограничения сложности декодирования. В конце работы формулируются фундаментальные проблемы прикладной криптографии, решение которых могло бы значительно стимулировать дальнейшее развитие этой отрасли науки. </p></abstract><trans-abstract xml:lang="en"><p>Actuality. The current paper is the second part of the paper “Advance in Applied Cryptography Theory: Survey and Some New Results. Part 1. Key Cryptography” published in the journal PTU, n.4, 2024. It is devoted to such specific area of applied cryptography as keyless one (KC\ Actuality of the current paper consists  in the fact that considered in it methods allow to provide a confidentiality of information transmission over public communication channels, either without any its encryption in advance, executing a natural properties of communication channels   or executing conventional key cryptography but with the keys which are elaborated before by means of KC. </p><p>The natural properties of communication channels can be the following: additive noise, multiray wave propagation, MIMO technology and existence of feedback channel.</p><p>Our paper starts with a consideration of Wyner’s concept of wire-tap channels and corresponding to it encoding and decoding methods providing very reliable information transmission over the main channels and negligible amount of information leaking over the wire-tap channels to eavesdroppers. Next it is investigated scenario   with a commutative encryption (CE) and corresponding protocol of message exchange over ordinary noiseless public channel that provides security of encrypted information but without any key exchange between users in advance. It is proved which of well known symmetric and asymmetric ciphers are commutative or non-commutative ones. Next model concerns a fading channels under the application of Dean-Goldsmith protocol in frames of MIMO technology. We are proving that this protocol is secure if, and only if, the number of eavesdropper antennas is less than the number of antennas at legitimate users. Next scenario executes  variable directional antennas (VDA) and it is proved for which conditions  on a locations of legitimate users and eavesdroppers  such approach occurs secure given the number of propagation rays is at least two..   We show in the next chapter that there is an attack compromising of recently proposed EVESkey cryptosystem and hence such one is not secure in spite of the statement of its authors.</p><p>Finally, we investigate several protocols intended for key sharing over noiseless constant public channels (like Internet) and established that they are mostly insecure because have all zero secret capacity. Only one protocol based on matrix channel exchange is able to provide security of key sharing but in terms of the required breaking complexity. Thus such approach can be used only for the case when legitimate users belong to low level of security requirements.</p><p>At the end of the paper we formulate several fundamental problems of applied cryptography which after of their solutions  could be very useful for practice.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>бесключевая криптография</kwd><kwd>отводной канал</kwd><kwd>MIMO-технология</kwd><kwd>физический уровень секретности</kwd><kwd>усиление секретности</kwd><kwd>коммутативное шифрование</kwd></kwd-group><kwd-group xml:lang="en"><kwd>keyless cryptography</kwd><kwd>wire-tap channel concept</kwd><kwd>physical level security</kwd><kwd>MIMO technology</kwd><kwd>privacy amplification</kwd><kwd>commutative encryption</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Alpern B., Schneider F.B. Key exchange using ‘keyless cryptography’ // Information Processing Letters. 1983. Vol. 16. Iss. 2. PP. 79‒81. DOI:10.1016/0020-0190(83)90029-7</mixed-citation><mixed-citation xml:lang="en">Alpern B., Schneider F.B. Key exchange using ‘keyless cryptography’. Information Processing Letters. 1983:16(2):79‒81. DOI:10.1016/0020-0190(83)90029-7</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V. Keyless cryptography // Proceedings of the 9th International Conference on System Administration, Networking and Security (Orlando, USA). 2000.</mixed-citation><mixed-citation xml:lang="en">Korzhik V. Keyless cryptography. Proceedings of the 9th International Conference on System Administration, Networking and Security, Orlando, USA. 2000</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Bakin M. Information-theoretical Secure Keyless intensification // Proceedings of the 2000 IEEE International Symposium on Information Theory (Sorrento, Italy, 25‒30 June 2000). Piscataway: IEEE Press, 2000. DOI:10.1109/ISIT.2000.866310</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Bakin M. Information-theoretical Secure Keyless intensification. Proceedings of the 2000 IEEE International Symposium on Information Theory, 25‒30 June 2000, Sorrento, Italy. Piscataway: IEEE Press; 2000. DOI:10.1109/ISIT.2000.866310</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V. Keyless cryptography // Invited Talk at Security Seminar at CERIAS Purdue University. 2001</mixed-citation><mixed-citation xml:lang="en">Korzhik V. Keyless cryptography. Invited Talk at Security Seminar at CERIAS Purdue University. 2001</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Mukherjee A., Fakoorian S.A.A., Huang J., Swindlehurst A.L. Principles of Physical Layer Security in Multiuser Wireless Network A. Survey // IEEE Communications Surveys &amp; Tutorials. 2014. Vol. 16. Iss. 3. PP. 1550‒1573. DOI:10.1109/SURV.2014.012314.00178</mixed-citation><mixed-citation xml:lang="en">Mukherjee A., Fakoorian S.A.A., Huang J., Swindlehurst A.L. Principles of Physical Layer Security in Multiuser Wireless Network A. Survey. IEEE Communications Surveys &amp; Tutorials. 2014;16(3):1550‒1573. DOI:10.1109/SURV.2014.012314.00178</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Wyner A.D. The Wire-tap channel // Bell System Technical Journal. 1975. Vol. 54. Iss. 8. PP. 1355‒1387. DOI:10.1002/j.1538-7305.1975.tb02040.x</mixed-citation><mixed-citation xml:lang="en">Wyner A.D. The Wire-tap channel. Bell System Technical Journal. 1975;54(8):1355‒1387. DOI:10.1002/j.1538-7305.1975.tb02040.x</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Bennett C.H., Bessette F., Brassard G., Salvail L., Smolin J. Experimental quantum cryptography // Journal of Cryptology. 1992. Vol. 5. PP. 3‒28. DOI:10.1007/BF00191318</mixed-citation><mixed-citation xml:lang="en">Bennett C.H., Bessette F., Brassard G., Salvail L., Smolin J. Experimental quantum cryptography. Journal of Cryptology. 1992;5:3‒28. DOI:10.1007/BF00191318</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Кушнир Д.В. Исследование и разработка методов распределения конфиденциальных данных по квантовым каналам. Автореф. дис. канд. техн. наук. СПб.: СПбГУТ, 1996. 16 с. EDN:ZJDTTT</mixed-citation><mixed-citation xml:lang="en">Kushnir D.V. Research and Development of Methods of Confidential Data Distribution on Quanto Channels. PhD Thesis. St. Petersburg: The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Publ.; 1996. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Яковлев В.А. Основы криптографии. СПб.: Интермедия, 2016. 296 с. EDN:WEQWMN</mixed-citation><mixed-citation xml:lang="en">Korzhik V.I., Yakovlev V.A. Fundamentals of Cryptology St. Petersburg: Intermediia Publ.; 2016. 296 p. (in Russ.) EDN:WEQWMN</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Kushnir D. Key sharing based on the wire-tap channel type ii concept with noisy main channel // Proceedings of the International Conference on the Theory and Applications of Crypotology and Information Security (ASIACRYPT '96, Kyongju, Korea, 3‒7 November 1996). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1996. Vol. 1163. PP. 210‒217. DOI:10.1007/BFb0034848</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Kushnir D. Key sharing based on the wire-tap channel type ii concept with noisy main channel // Proceedings of the International Conference on the Theory and Applications of Crypotology and Information Security, ASIACRYPT '96, 3‒7 November 1996, Kyongju, Korea. Lecture Notes in Computer Science, vol.1163. Berlin, Heidelberg: Springer; 1996. p.210‒217. DOI:10.1007/BFb0034848</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Liu Y., Zhang W.J., Jiang C., Chen J.P., Zhang C., Pan W.X., et al. Experimental Twin-Field Quantum Key Distribution over 1000 km Fiber Distance // Physical Review Letters. 2023. Vol. 130. P. 210801. DOI:10.1103/PhysRevLett.130.210801</mixed-citation><mixed-citation xml:lang="en">Liu Y., Zhang W.J., Jiang C., Chen J.P., Zhang C., Pan W.X., et al. Experimental Twin-Field Quantum Key Distribution over 1000 km Fiber Distance. Physical Review Letters. 2023;130:210801. DOI:10.1103/PhysRevLett.130.210801</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Milov M., Pham T.M., Chorti A., Barreto A.N., Fettweis G. Physical Layer Security ‒ From Theory to Practice // IEEE BITS the Information Theory Magazine. 2023. Vol. 3. Iss. 2. PP. 67‒79. DOI:10.1109/MBITS.2023.3338569</mixed-citation><mixed-citation xml:lang="en">Milov M., Pham T.M., Chorti A., Barreto A.N., Fettweis G. Physical Layer Security ‒ From Theory to Practice. IEEE BITS the Information Theory Magazine. 2023;3(2):67‒79. DOI:10.1109/MBITS.2023.3338569</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Шеннон К.Э. Работы по теории информации и кибернетике. М.: Издательство иностранной литературы, 1963. 829 с.</mixed-citation><mixed-citation xml:lang="en">Shannon K.E. Works on Information Theory and Cybernetics. Moscow: Foreign Literature Publ.; 1963. 829 p. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Maurer U.M. Secret key agreement by public discussion based on common information // IEEE Transactions on Information Theory. 1993. Vol. 39. Iss. 3. PP. 733‒742. DOI:10.1109/18.256484</mixed-citation><mixed-citation xml:lang="en">Maurer U.M. Secret key agreement by public discussion based on common information. IEEE Transactions on Information Theory. 1993;39(3):733‒742. DOI:10.1109/18.256484</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Яковлев В.А. Неасимптотическая оценка эффективности кодового зашумления в каналах с отводом // Проблемы передачи информации. 1991. № 4. С. 223‒228.</mixed-citation><mixed-citation xml:lang="en">Korzhik V.I., Yakovlev V.A. Non-asymptotic estimation of the efficiency of coded noise cancellation in channels with diversion. Problems of Information Transmission. 1991;4:223-228. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Петерсон У., Уэлнод Э. Коды, исправленные ошибки. М.: Мир, 1976.</mixed-citation><mixed-citation xml:lang="en">Peterson W., Welnod E. Codes, Fixed Errors. Moscow: Mir Publ.; 1976. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Яковлев В.А. Защита информации от утечки за счет побочных электромагнитных излучений и наводок на основе способа кодового зашумления // Информатика и вычислительная техника. 1993. Т. 8. № 1-2. С. 61‒66.</mixed-citation><mixed-citation xml:lang="en">Korzhik V.I., Yakovlev V.A. Information protection from leakage due to side electromagnetic radiation and interfer-ence based on the code noise method. Informatika i vychislitelnaia tekhnika. 1993;8(1-2):61‒66. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Morales-Luna G., Balakirsky V.B. Privacy amplification theorem for noisy main channel // Proceedings of the 4th International Conference on Information Security (ISC 2001, Malaga, Spain, 1‒3 October 2001). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2001. Vol. 2200. PP. 18‒26. DOI:10.1007/3-540-45439-X_2</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Morales-Luna G., Balakirsky V.B. Privacy amplification theorem for noisy main channel. Proceedings of the 4th International Conference on Information Security, ISC 2001, 1‒3 October 2001, Malaga, Spain. Lecture Notes in Computer Science, vol.2200. Berlin, Heidelberg: Springer; 2001. p.18‒26. DOI:10.1007/3-540-45439-X_2</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Yakovlev V., Korzhik V., G.Morales Luna Key Distribution Protocol Based on Noisy Channels in Presence of Active Adversary // IEEE Transactions on Information Theory. 2008. Vol. 54. Iss. 6. PP. 2535‒2550. DOI:10.1109/TIT.2008.921689</mixed-citation><mixed-citation xml:lang="en">Yakovlev V., Korzhik V. Key Distribution Protocol Based on Noisy Channels in Presence of Active Adversary. IEEE Transactions on Information Theory. 2008;54(6):2535‒2550. DOI:10.1109/TIT.2008.921689</mixed-citation></citation-alternatives></ref><ref id="cit20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Шнайер Б. Прикладная криптография. М.: Триумф, 2002.</mixed-citation><mixed-citation xml:lang="en">Schneier B. Applied Cryptography. Moscow: Triumf Publ.; 2002. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Starostin V., Yakovlev V., Kabardov M., Krasov A., Adadurov S. Advance in Keyless Cryptography. Chapter 6 // In: Ramakrishnan S. (ed.) Lightweight Cryptographic Techniques and Cybersecurity Approaches. 2022. PP. 97‒117. DOI:10.5772/intechopen.104429</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Starostin V., Yakovlev V., Kabardov M., Krasov A., Adadurov S. Advance in Keyless Cryptography. Chapter 6. In: Ramakrishnan S. (ed.) Lightweight Cryptographic Techniques and Cybersecurity Approaches. 2022. p.97‒117. DOI:10.5772/intechopen.104429</mixed-citation></citation-alternatives></ref><ref id="cit22"><label>22</label><citation-alternatives><mixed-citation xml:lang="ru">Tilborg H.C.A. Encyclopedia of Cryptography and Security. Springer, 2005.</mixed-citation><mixed-citation xml:lang="en">Tilborg H.C.A. Encyclopedia of Cryptography and Security. Springer, 2005.</mixed-citation></citation-alternatives></ref><ref id="cit23"><label>23</label><citation-alternatives><mixed-citation xml:lang="ru">Myasnikov A.G., Shpilrain V., Ushakov A. Non-commutative Cryptography and Group-theoretic Problems. American Mathematical Society, 2011. 385 p.</mixed-citation><mixed-citation xml:lang="en">Myasnikov A.G., Shpilrain V., Ushakov A. Non-commutative Cryptography and Group-theoretic Problems. American Mathematical Society; 2011. 385 p.</mixed-citation></citation-alternatives></ref><ref id="cit24"><label>24</label><citation-alternatives><mixed-citation xml:lang="ru">Goldreich O. Goldwasser S., Halevi S. Public-key cryptosystems from Lattice reduction problems // Proceedings of the 17th Annual International Cryptology Conference (CRYPTO '97, Santa Barbara, USA, 17‒21 August 1997). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 1997. Vol. 1294. PP. 112‒131. DOI:10.1007/BFb0052231</mixed-citation><mixed-citation xml:lang="en">Goldreich O., Goldwasser S., Halevi S. Public-key cryptosystems from Lattice reduction problems. Proceedings of the 17th Annual International Cryptology Conference, CRYPTO '97, 17‒21 August 1997, Santa Barbara, USA. Lecture Notes in Computer Science, vol.1294. Berlin, Heidelberg: Springer; 1997. p.112‒131. DOI:10.1007/BFb0052231</mixed-citation></citation-alternatives></ref><ref id="cit25"><label>25</label><citation-alternatives><mixed-citation xml:lang="ru">Dean T., Goldsmith Aj. Physical layer cryptography through massive MIMO // Proceedings of the 2013 IEEE Information Theory Workshop (ITW, 9‒13 September 2013, Seville, Spain). Piscataway: IEEE, 2013. PP. 1‒3. DOI:10.1109/ITW.2013.6691222</mixed-citation><mixed-citation xml:lang="en">Dean T., Goldsmith Aj. Physical layer cryptography through massive MIMO. Proceedings of the 2013 IEEE Information Theory Workshop, ITW, Seville, Spain, 9‒13 September 2013. Piscataway: IEEE; 2013. p.1‒3. DOI:10.1109/ITW.2013.6691222</mixed-citation></citation-alternatives></ref><ref id="cit26"><label>26</label><citation-alternatives><mixed-citation xml:lang="ru">Ben-Israel A., Greville T.N.E. Generalized Inverses: Theory and Applications. Springer, 2003.</mixed-citation><mixed-citation xml:lang="en">Ben-Israel A., Greville T.N.E. Generalized Inverses: Theory and Applications. Springer; 2003.</mixed-citation></citation-alternatives></ref><ref id="cit27"><label>27</label><citation-alternatives><mixed-citation xml:lang="ru">Steinfeld R., Sakzad A. On massive MIMO physical layer cryptosystems // Proceedings of IEEE Information Theory Workshop ‒ Fall (ITW, Jeju, Korea (South), 11‒15 October 2015). IEEE, 2015. PP. 292‒296. DOI:10.1109/ITWF.2015.7360782</mixed-citation><mixed-citation xml:lang="en">Steinfeld R., Sakzad A. On massive MIMO physical layer cryptosystems. Proceedings of IEEE Information Theory Workshop ‒ Fall, ITW, 11‒15 October 2015, Jeju, Korea (South). IEEE; 2015. p.292‒296. DOI:10.1109/ITWF.2015.7360782</mixed-citation></citation-alternatives></ref><ref id="cit28"><label>28</label><citation-alternatives><mixed-citation xml:lang="ru">Aono T., Higuchi K., Ohira T., Komiyama B., Sasaoka H. Wireless secret key generation exploiting reactance-domain scalar response of multipath fadiny cannels // IEEE Transactions on Antennas and Propagation. 2005. Vol. 53. Iss. 11. PP. 3776‒3784. DOI:10.1109/TAP.2005.858853</mixed-citation><mixed-citation xml:lang="en">Aono T., Higuchi K., Ohira T., Komiyama B., Sasaoka H. Wireless secret key generation exploiting reactance-domain scalar response of multipath fadiny cannels. IEEE Transactions on Antennas and Propagation. 2005;53(11):3776‒3784. DOI:10.1109/TAP.2005.858853</mixed-citation></citation-alternatives></ref><ref id="cit29"><label>29</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Yakovlev V., Kovajkin Y. Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna // International Journal of Advanced Computer Science and Applications. 2012. Vol. 3. Iss. 1. PP. 172‒178.</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Yakovlev V., Kovajkin Y. Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna. International Journal of Advanced Computer Science and Applications. 2012;3(1):172‒178.</mixed-citation></citation-alternatives></ref><ref id="cit30"><label>30</label><citation-alternatives><mixed-citation xml:lang="ru">Qin D., Ding Z. Exploiting Multi Antenna Non-Reciprocal Channels for Share Secret Key Generation // IEEE Transactions on Information Forensics and Security. 2016. Vol. 11. Iss. 12. PP. 2691‒2705. DOI:10.1109/TIFS.2016.2594143</mixed-citation><mixed-citation xml:lang="en">Qin D., Ding Z. Exploiting Multi Antenna Non-Reciprocal Channels for Share Secret Key Generation. IEEE Transactions on Information Forensics and Security. 2016;11(12):2691‒2705. DOI:10.1109/TIFS.2016.2594143</mixed-citation></citation-alternatives></ref><ref id="cit31"><label>31</label><citation-alternatives><mixed-citation xml:lang="ru">Yakovlev V., Korzhik V., Starostin V., Lapshin A. Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions // Proceedings of the 32nd Conference of Open Innovations Association FRUCT (Tampere, Finland, 9‒11 November 2022). FRUCT 32, 2022. PP. 300‒307. DOI:10.23919/FRUCT56874.2022.9953895</mixed-citation><mixed-citation xml:lang="en">Yakovlev V., Korzhik V., Starostin V., Lapshin A. Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions. Proceedings of the 32nd Conference of Open Innovations Association FRUCT, 9‒11 November 2022, Tampere, Finland. FRUCT-32; 2022. p.300‒307. DOI:10.23919/FRUCT56874.2022.9953895</mixed-citation></citation-alternatives></ref><ref id="cit32"><label>32</label><citation-alternatives><mixed-citation xml:lang="ru">Lai E., Gamal H.El., Poor H.V. The Wiretap Channel with Feedback Encryption over the Cannel // IEEE Transactions on Information Theory. 2008. Vol. 54. Iss. 11. PP. 5059‒5067. DOI:10.1109/TIT.2008.929914</mixed-citation><mixed-citation xml:lang="en">Lai E., Gamal H.El., Poor H.V. The Wiretap Channel with Feedback Encryption over the Cannel. IEEE Transactions on Information Theory. 2008;54(11):5059‒5067. DOI:10.1109/TIT.2008.929914</mixed-citation></citation-alternatives></ref><ref id="cit33"><label>33</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Yakovlev V., Starostin V., Lapshin A. Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Cannels with Feedback // Proceedings of the 35th Conference of Open Innovations Association FRUCT-35 (Tampere, Finland, 24‒26 April 2024). FRUCT-35, 2024. PP. 374‒379 DOI:10.23919/FRUCT61870.2024.10516344</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Yakovlev V., Starostin V., Lapshin A. Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Cannels with Feedback. Proceedings of the 35th Conference of Open Innovations Association FRUCT-35, 24‒26 April 2024, Tampere, Finland. FRUCT Oy; 2024. p.374‒379 DOI:10.23919/FRUCT61870.2024.10516344</mixed-citation></citation-alternatives></ref><ref id="cit34"><label>34</label><citation-alternatives><mixed-citation xml:lang="ru"></mixed-citation><mixed-citation xml:lang="en"></mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
