Loading…

Hierarchical Encryption in a Residual Number System

Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The proposed approach simplifies hardware implementation and enhances operational speed by red...

Full description

Saved in:
Bibliographic Details
Main Authors: Yakymenko, Igor, Martyniuk, Olesya, Martyniuk, Serhii, Martyniuk, Andrii, Yakymenko, Yurii, Kasianchuk, Mykhailo
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 499
container_issue
container_start_page 496
container_title
container_volume
creator Yakymenko, Igor
Martyniuk, Olesya
Martyniuk, Serhii
Martyniuk, Andrii
Yakymenko, Yurii
Kasianchuk, Mykhailo
description Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The proposed approach simplifies hardware implementation and enhances operational speed by reducing modulus sizes and consequently numerical operands at each subsequent level, as well as by parallelizing computational processes. Utilizing this encryption method enables the creation of reliable, efficient, and resistant-to-cryptanalysis systems for protecting information streams. A encryption/decryption scheme and an application example of the method are provided.
doi_str_mv 10.1109/ACIT62333.2024.10712567
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_10712567</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10712567</ieee_id><sourcerecordid>10712567</sourcerecordid><originalsourceid>FETCH-ieee_primary_107125673</originalsourceid><addsrcrecordid>eNqFzrEOgjAUheFqYiJR3sDEvoB4ewtURkMwuDgoO6l4jTWApMWBt5dBZ5OT_MO3HMbWAgIhINnu02MRo5QyQMAwEKAERrGaMD9RyU5GMA5COWUeKgWbCDGeM9-5JwBIhHA0j8nckNW2ephK1zxrKzt0vXm13LRc8zM5c3uPcHo3V7L8MriemiWb3XXtyP92wVaHrEjzjSGisrOm0XYof3_kH_4AyYA3vA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Hierarchical Encryption in a Residual Number System</title><source>IEEE Xplore All Conference Series</source><creator>Yakymenko, Igor ; Martyniuk, Olesya ; Martyniuk, Serhii ; Martyniuk, Andrii ; Yakymenko, Yurii ; Kasianchuk, Mykhailo</creator><creatorcontrib>Yakymenko, Igor ; Martyniuk, Olesya ; Martyniuk, Serhii ; Martyniuk, Andrii ; Yakymenko, Yurii ; Kasianchuk, Mykhailo</creatorcontrib><description>Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The proposed approach simplifies hardware implementation and enhances operational speed by reducing modulus sizes and consequently numerical operands at each subsequent level, as well as by parallelizing computational processes. Utilizing this encryption method enables the creation of reliable, efficient, and resistant-to-cryptanalysis systems for protecting information streams. A encryption/decryption scheme and an application example of the method are provided.</description><identifier>EISSN: 2770-5226</identifier><identifier>EISBN: 9798350350043</identifier><identifier>DOI: 10.1109/ACIT62333.2024.10712567</identifier><language>eng</language><publisher>IEEE</publisher><subject>Chinese Remainder Theorem ; Encryption ; encryption/decryption process ; Hardware ; hierarchical residue number systems ; Information technology ; module ; Reliability ; residues ; Streams</subject><ispartof>2024 14th International Conference on Advanced Computer Information Technologies (ACIT), 2024, p.496-499</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10712567$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,27902,54530,54907</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10712567$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yakymenko, Igor</creatorcontrib><creatorcontrib>Martyniuk, Olesya</creatorcontrib><creatorcontrib>Martyniuk, Serhii</creatorcontrib><creatorcontrib>Martyniuk, Andrii</creatorcontrib><creatorcontrib>Yakymenko, Yurii</creatorcontrib><creatorcontrib>Kasianchuk, Mykhailo</creatorcontrib><title>Hierarchical Encryption in a Residual Number System</title><title>2024 14th International Conference on Advanced Computer Information Technologies (ACIT)</title><addtitle>ACIT</addtitle><description>Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The proposed approach simplifies hardware implementation and enhances operational speed by reducing modulus sizes and consequently numerical operands at each subsequent level, as well as by parallelizing computational processes. Utilizing this encryption method enables the creation of reliable, efficient, and resistant-to-cryptanalysis systems for protecting information streams. A encryption/decryption scheme and an application example of the method are provided.</description><subject>Chinese Remainder Theorem</subject><subject>Encryption</subject><subject>encryption/decryption process</subject><subject>Hardware</subject><subject>hierarchical residue number systems</subject><subject>Information technology</subject><subject>module</subject><subject>Reliability</subject><subject>residues</subject><subject>Streams</subject><issn>2770-5226</issn><isbn>9798350350043</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNqFzrEOgjAUheFqYiJR3sDEvoB4ewtURkMwuDgoO6l4jTWApMWBt5dBZ5OT_MO3HMbWAgIhINnu02MRo5QyQMAwEKAERrGaMD9RyU5GMA5COWUeKgWbCDGeM9-5JwBIhHA0j8nckNW2ephK1zxrKzt0vXm13LRc8zM5c3uPcHo3V7L8MriemiWb3XXtyP92wVaHrEjzjSGisrOm0XYof3_kH_4AyYA3vA</recordid><startdate>20240919</startdate><enddate>20240919</enddate><creator>Yakymenko, Igor</creator><creator>Martyniuk, Olesya</creator><creator>Martyniuk, Serhii</creator><creator>Martyniuk, Andrii</creator><creator>Yakymenko, Yurii</creator><creator>Kasianchuk, Mykhailo</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20240919</creationdate><title>Hierarchical Encryption in a Residual Number System</title><author>Yakymenko, Igor ; Martyniuk, Olesya ; Martyniuk, Serhii ; Martyniuk, Andrii ; Yakymenko, Yurii ; Kasianchuk, Mykhailo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_107125673</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Chinese Remainder Theorem</topic><topic>Encryption</topic><topic>encryption/decryption process</topic><topic>Hardware</topic><topic>hierarchical residue number systems</topic><topic>Information technology</topic><topic>module</topic><topic>Reliability</topic><topic>residues</topic><topic>Streams</topic><toplevel>online_resources</toplevel><creatorcontrib>Yakymenko, Igor</creatorcontrib><creatorcontrib>Martyniuk, Olesya</creatorcontrib><creatorcontrib>Martyniuk, Serhii</creatorcontrib><creatorcontrib>Martyniuk, Andrii</creatorcontrib><creatorcontrib>Yakymenko, Yurii</creatorcontrib><creatorcontrib>Kasianchuk, Mykhailo</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yakymenko, Igor</au><au>Martyniuk, Olesya</au><au>Martyniuk, Serhii</au><au>Martyniuk, Andrii</au><au>Yakymenko, Yurii</au><au>Kasianchuk, Mykhailo</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Hierarchical Encryption in a Residual Number System</atitle><btitle>2024 14th International Conference on Advanced Computer Information Technologies (ACIT)</btitle><stitle>ACIT</stitle><date>2024-09-19</date><risdate>2024</risdate><spage>496</spage><epage>499</epage><pages>496-499</pages><eissn>2770-5226</eissn><eisbn>9798350350043</eisbn><abstract>Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The proposed approach simplifies hardware implementation and enhances operational speed by reducing modulus sizes and consequently numerical operands at each subsequent level, as well as by parallelizing computational processes. Utilizing this encryption method enables the creation of reliable, efficient, and resistant-to-cryptanalysis systems for protecting information streams. A encryption/decryption scheme and an application example of the method are provided.</abstract><pub>IEEE</pub><doi>10.1109/ACIT62333.2024.10712567</doi></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2770-5226
ispartof 2024 14th International Conference on Advanced Computer Information Technologies (ACIT), 2024, p.496-499
issn 2770-5226
language eng
recordid cdi_ieee_primary_10712567
source IEEE Xplore All Conference Series
subjects Chinese Remainder Theorem
Encryption
encryption/decryption process
Hardware
hierarchical residue number systems
Information technology
module
Reliability
residues
Streams
title Hierarchical Encryption in a Residual Number System
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T18%3A31%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Hierarchical%20Encryption%20in%20a%20Residual%20Number%20System&rft.btitle=2024%2014th%20International%20Conference%20on%20Advanced%20Computer%20Information%20Technologies%20(ACIT)&rft.au=Yakymenko,%20Igor&rft.date=2024-09-19&rft.spage=496&rft.epage=499&rft.pages=496-499&rft.eissn=2770-5226&rft_id=info:doi/10.1109/ACIT62333.2024.10712567&rft.eisbn=9798350350043&rft_dat=%3Cieee_CHZPO%3E10712567%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-ieee_primary_107125673%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10712567&rfr_iscdi=true