DOI: https://doi.org/10.15588/1607-3274-2019-1-17

DENIABLE ENCRYPTION BASED ON HYBRID CRYPTOGRAPHIC SYSTEMS USING

A. V. Galchenko, S. V. Choporov

Abstract


Context. Unauthorized access to well-protected information and telecommunication systems is a topical problem in the information security field [1]. For this problem solving, it is proposed to use the deniable encryption mechanisms, which allows its
managers to object to the existence of data, ensure their confidentiality and protect the information managers from brute force using by the intruders to obtain key information, during the unauthorized access to information. The article outlines the approach to the use of the existing deniable encryption algorithms for the protection of large data arrays.
Objective. The main purpose of this researching is a hypothesis test that it’s possibile to use deniable encryption algorithms for large data arrays protection, because all algorithms in this direction are asymmetric and not adapted to work with “big data”.                                                                                      Method. The test of hypothesis is carried out by additional data processing units using in the output deniable encryption algorithm with public key, which based on the extended cryptographic scheme of Rabin [2] and whose structure and features are most suitable for verifying this hypothesis put forward by the author.         Results. According to the experiments result, the authors proposed a prototype of deniable encryption algorithm with block encryption of data implemented, which also preserves the deniability mechanism features from the original deniable encryption algorithm. Besides, all changes in algorithm which were proposed by the authors provide the productivity increasing compared with existing approaches [3–6].                                                                                                 Conclusions. Authors have solved a problem of using the existing deniable encryption algorithms, for the large data arrays security, for example for the deniable encryption algorithm with open key, which based on the Rabin extended cryptographic scheme. The proposed approach of the hybrid algorithm constructing with deniable mechanism demonstrates not only the preservation of the basic algorithm properties, but also good performance of the any size data block encrypting ability. Proposed algorithm allows to solve not only the problem of ensuring data confidentiality during the unauthorized access to them, but also makes its suitable for practical using.


Keywords


block encryption; brute force; deniable encryption; information and telecommunication system; denability; unauthorized access; data processing; pseudo-likelihood; public data; recognition; extended cryptographic schema Rabin; secret data, static data.

References


Analiticheskij centr kompanii InfoWatch [Elektronnij

resurs]. Moscow, InfoWatch, 2017–2018. Rezhim dostupu:

www.infowatch.ru/analytics/digest/19546.

Moldovyan N. A., Vajchikauskas M. A. Rasshirenie

kriptosxemy Rabina: algoritm otricaemogo shifrovaniya po

otkrytomu klyuchu, Nauchno-texnicheskij centr oboronnogo

kompleksa «Kompas», Voprosy zashhity informacii, 2014,

No. 2, pp. 12–16.

Goldwasser S., Micali S. Probabilistic encrypton Journal of

Computer and System Sciences, 1984, Vol. 28, pp. 270–299.

Ibrahim H. Receiver-Deniable Public-Key Encryption,

International Journal of Network Security, 2009, Vol. 8,

No. 2, pp. 159–165.

Moldovyan N. A., Birichevskij A. R., Mondikova Ya. A.

Otricaemoe shifrovanie na osnove blochnyx shifrov,

Informacionno-upravlyayushhie sistemy, 2014, No. 5,

pp. 80–86.

Moldovyan A. A., Tatchina Ya. A. Sposoby

psevdoveroyatnostnogo blochnogo shifrovaniya,

Intellektual’nye texnologii na transporte, 2018, No. 1,

pp. 25–30.

Canetti R., Dwork C., Naor M., Ostrovsky R. Deniable

Encryption, Advances in Cryptology, CRYPTO, 1997,

Procedings, pp. 90–104.

Bo Meng, Jiang Qing Wang A Receiver Deniable Encryption

Scheme, Proceedings of the 2009 International Symposium

on Information Processing (ISIP’09), 2009, pp. 254–

Gal’chenko A. V. Perspektyvy vykorystannja

zaperechuvanogo shyfruvannja v galuzi aviaperevezen’,

AVIA 2017: HIII Mizhnarodna naukovo-tehnichna

konferencija, Kyi’v, 19–21 kvitnja 2017 r, tezy dopovidej.

Kyi’v, NAU, 2017, pp. 24–28.

Gal’chenko A. V. Zahyst personal’nyh danyh z

vykorystannjam algorytmiv neodnoznachnogo shyfruvannja,

Visnyk ZNU: Matematychne modeljuvannja ta prykladna

mehanika, 2017, No. 2, pp. 19–32.

Moldovyan N. A., Mixteev M. S., Nguen K. T. Protokol

otricaemogo shifrovaniya po otkrytomu klyuchu,

vklyuchayushhij proceduru autentifikacii pol’zovatelej,

Voprosy zashhity informacii, 2016, No. 3, pp. 9–15.

Moldovyan N. A., Bashirov Z. S., Solnyshkin Zh. A.

Protokol potochnogo otricaemogo shifrovaniya s

razdelyaemym klyuchom, Voprosy zashhity informacii,

, No. 3, pp. 27–31.

Shnajer B. Prikladnaya kriptografiya: Protokoly, algoritmy,

isxodnye teksty na yazyke Si. Moscow, Triumf, 2012, 816 p.


GOST Style Citations


1. Аналитический центр компании InfoWatch [Електрон-
ный ресурс]. – Москва : InfoWatch, 2017–2018. – Режим
доступу: www.infowatch.ru/analytics/digest/19546.
2. Молдовян Н. А. Расширение криптосхемы Рабина: алго-
ритм отрицаемого шифрования по открытому ключу /
Н. А. Молдовян, М. А. Вайчикаускас // Научно-
технический центр оборонного комплекса «Компас»:
Вопросы защиты информации. – 2014. – № 2. – С. 12–16.
3. Goldwasser S. Probabilistic encrypton / S. Goldwasser,
S. Micali // Journal of Computer and System Sciences. –
1984. – Vol. 28. – P. 270–299.
4. Ibrahim H. Receiver-Deniable Public-Key Encryption /
H. Ibrahim // International Journal of Network Security. –
2009. – Vol. 8, No. 2. – P. 159–165.
5. Молдовян Н. А. Отрицаемое шифрование на основе
блочных шифров / Н. А. Молдовян, А. Р. Биричевский,
Я. А. Мондикова // Информационно-управляющие сис-
темы. – 2014. – № 5. – С. 80–86.
6. Молдовян А. А. Способы псевдовероятностного блоч-
ного шифрования / А. А. Молдовян, Я. А. Татчина // Ин-
теллектуальные технологии на транспорте. – 2018. –
№ 1. – С. 25–30.
7. Canetti R. Deniable Encryption / R. Canetti, C. Dwork,
M. Naor, R. Ostrovsky // Advances in Cryptology:
CRYPTO. – 1997. – Procedings. – P. 90–104.
8. Bo Meng. A Receiver Deniable Encryption Scheme / Bo
Meng, Jiang Qing Wang // Proceedings of the 2009 International
Symposium on Information Processing (ISIP’09). –
2009. – P. 254–257.
9. Гальченко А. В. Перспективи використання заперечува-
ного шифрування в галузі авіаперевезень / А. В. Гальче-
нко // АВІА 2017: ХІІІ Міжнародна науково-технічна
конференція, Київ, 19–21 квітня 2017 р. : тези допові-
дей. – Київ : НАУ, 2017. – С. 24–28.
10. Гальченко А. В. Захист персональних даних з викорис-
танням алгоритмів неоднозначного шифрування /
А. В. Гальченко // Вісник ЗНУ: Математичне моделю-
вання та прикладна механіка. – 2017. – № 2. – С. 19–32.

11. Молдовян Н. А. Протокол отрицаемого шифрования по
открытому ключу, включающий процедуру аутентифи-
кации пользователей / Н. А. Молдовян, М. С. Михтеев,
К. Т. Нгуен // Вопросы защиты информации. – 2016. –
№ 3. – С. 9–15.
12. Молдовян Н. А. Протокол поточного отрицаемого шиф-
рования с разделяемым ключом / Н. А. Молдовян,
З. С. Баширов, Ж. А. Солнышкин // Вопросы защиты
информации. – 2015. – № 3. – С. 27–31.
13. Шнайер Б. Прикладная криптография: Протоколы, алго-
ритмы, исходные тексты на языке Си / Б. Шнайер. – М. :
Триумф, 2012. – 816 с.







Copyright (c) 2019 A. V. Galchenko, S. V. Choporov

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Address of the journal editorial office:
Editorial office of the journal «Radio Electronics, Computer Science, Control»,
Zaporizhzhya National Technical University, 
Zhukovskiy street, 64, Zaporizhzhya, 69063, Ukraine. 
Telephone: +38-061-769-82-96 – the Editing and Publishing Department.
E-mail: rvv@zntu.edu.ua

The reference to the journal is obligatory in the cases of complete or partial use of its materials.