Loading…
Hierarchical Encryption in a Residual Number System
Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The proposed approach simplifies hardware implementation and enhances operational speed by red...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 499 |
container_issue | |
container_start_page | 496 |
container_title | |
container_volume | |
creator | Yakymenko, Igor Martyniuk, Olesya Martyniuk, Serhii Martyniuk, Andrii Yakymenko, Yurii Kasianchuk, Mykhailo |
description | Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The proposed approach simplifies hardware implementation and enhances operational speed by reducing modulus sizes and consequently numerical operands at each subsequent level, as well as by parallelizing computational processes. Utilizing this encryption method enables the creation of reliable, efficient, and resistant-to-cryptanalysis systems for protecting information streams. A encryption/decryption scheme and an application example of the method are provided. |
doi_str_mv | 10.1109/ACIT62333.2024.10712567 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_10712567</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10712567</ieee_id><sourcerecordid>10712567</sourcerecordid><originalsourceid>FETCH-ieee_primary_107125673</originalsourceid><addsrcrecordid>eNqFzrEOgjAUheFqYiJR3sDEvoB4ewtURkMwuDgoO6l4jTWApMWBt5dBZ5OT_MO3HMbWAgIhINnu02MRo5QyQMAwEKAERrGaMD9RyU5GMA5COWUeKgWbCDGeM9-5JwBIhHA0j8nckNW2ephK1zxrKzt0vXm13LRc8zM5c3uPcHo3V7L8MriemiWb3XXtyP92wVaHrEjzjSGisrOm0XYof3_kH_4AyYA3vA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Hierarchical Encryption in a Residual Number System</title><source>IEEE Xplore All Conference Series</source><creator>Yakymenko, Igor ; Martyniuk, Olesya ; Martyniuk, Serhii ; Martyniuk, Andrii ; Yakymenko, Yurii ; Kasianchuk, Mykhailo</creator><creatorcontrib>Yakymenko, Igor ; Martyniuk, Olesya ; Martyniuk, Serhii ; Martyniuk, Andrii ; Yakymenko, Yurii ; Kasianchuk, Mykhailo</creatorcontrib><description>Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The proposed approach simplifies hardware implementation and enhances operational speed by reducing modulus sizes and consequently numerical operands at each subsequent level, as well as by parallelizing computational processes. Utilizing this encryption method enables the creation of reliable, efficient, and resistant-to-cryptanalysis systems for protecting information streams. A encryption/decryption scheme and an application example of the method are provided.</description><identifier>EISSN: 2770-5226</identifier><identifier>EISBN: 9798350350043</identifier><identifier>DOI: 10.1109/ACIT62333.2024.10712567</identifier><language>eng</language><publisher>IEEE</publisher><subject>Chinese Remainder Theorem ; Encryption ; encryption/decryption process ; Hardware ; hierarchical residue number systems ; Information technology ; module ; Reliability ; residues ; Streams</subject><ispartof>2024 14th International Conference on Advanced Computer Information Technologies (ACIT), 2024, p.496-499</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10712567$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,27902,54530,54907</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10712567$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yakymenko, Igor</creatorcontrib><creatorcontrib>Martyniuk, Olesya</creatorcontrib><creatorcontrib>Martyniuk, Serhii</creatorcontrib><creatorcontrib>Martyniuk, Andrii</creatorcontrib><creatorcontrib>Yakymenko, Yurii</creatorcontrib><creatorcontrib>Kasianchuk, Mykhailo</creatorcontrib><title>Hierarchical Encryption in a Residual Number System</title><title>2024 14th International Conference on Advanced Computer Information Technologies (ACIT)</title><addtitle>ACIT</addtitle><description>Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The proposed approach simplifies hardware implementation and enhances operational speed by reducing modulus sizes and consequently numerical operands at each subsequent level, as well as by parallelizing computational processes. Utilizing this encryption method enables the creation of reliable, efficient, and resistant-to-cryptanalysis systems for protecting information streams. A encryption/decryption scheme and an application example of the method are provided.</description><subject>Chinese Remainder Theorem</subject><subject>Encryption</subject><subject>encryption/decryption process</subject><subject>Hardware</subject><subject>hierarchical residue number systems</subject><subject>Information technology</subject><subject>module</subject><subject>Reliability</subject><subject>residues</subject><subject>Streams</subject><issn>2770-5226</issn><isbn>9798350350043</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNqFzrEOgjAUheFqYiJR3sDEvoB4ewtURkMwuDgoO6l4jTWApMWBt5dBZ5OT_MO3HMbWAgIhINnu02MRo5QyQMAwEKAERrGaMD9RyU5GMA5COWUeKgWbCDGeM9-5JwBIhHA0j8nckNW2ephK1zxrKzt0vXm13LRc8zM5c3uPcHo3V7L8MriemiWb3XXtyP92wVaHrEjzjSGisrOm0XYof3_kH_4AyYA3vA</recordid><startdate>20240919</startdate><enddate>20240919</enddate><creator>Yakymenko, Igor</creator><creator>Martyniuk, Olesya</creator><creator>Martyniuk, Serhii</creator><creator>Martyniuk, Andrii</creator><creator>Yakymenko, Yurii</creator><creator>Kasianchuk, Mykhailo</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20240919</creationdate><title>Hierarchical Encryption in a Residual Number System</title><author>Yakymenko, Igor ; Martyniuk, Olesya ; Martyniuk, Serhii ; Martyniuk, Andrii ; Yakymenko, Yurii ; Kasianchuk, Mykhailo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_107125673</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Chinese Remainder Theorem</topic><topic>Encryption</topic><topic>encryption/decryption process</topic><topic>Hardware</topic><topic>hierarchical residue number systems</topic><topic>Information technology</topic><topic>module</topic><topic>Reliability</topic><topic>residues</topic><topic>Streams</topic><toplevel>online_resources</toplevel><creatorcontrib>Yakymenko, Igor</creatorcontrib><creatorcontrib>Martyniuk, Olesya</creatorcontrib><creatorcontrib>Martyniuk, Serhii</creatorcontrib><creatorcontrib>Martyniuk, Andrii</creatorcontrib><creatorcontrib>Yakymenko, Yurii</creatorcontrib><creatorcontrib>Kasianchuk, Mykhailo</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yakymenko, Igor</au><au>Martyniuk, Olesya</au><au>Martyniuk, Serhii</au><au>Martyniuk, Andrii</au><au>Yakymenko, Yurii</au><au>Kasianchuk, Mykhailo</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Hierarchical Encryption in a Residual Number System</atitle><btitle>2024 14th International Conference on Advanced Computer Information Technologies (ACIT)</btitle><stitle>ACIT</stitle><date>2024-09-19</date><risdate>2024</risdate><spage>496</spage><epage>499</epage><pages>496-499</pages><eissn>2770-5226</eissn><eisbn>9798350350043</eisbn><abstract>Within this article, a method of symmetric encryption of information based on a hierarchical residue number system has been developed. The corresponding mathematical and algorithmic framework is presented. The proposed approach simplifies hardware implementation and enhances operational speed by reducing modulus sizes and consequently numerical operands at each subsequent level, as well as by parallelizing computational processes. Utilizing this encryption method enables the creation of reliable, efficient, and resistant-to-cryptanalysis systems for protecting information streams. A encryption/decryption scheme and an application example of the method are provided.</abstract><pub>IEEE</pub><doi>10.1109/ACIT62333.2024.10712567</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2770-5226 |
ispartof | 2024 14th International Conference on Advanced Computer Information Technologies (ACIT), 2024, p.496-499 |
issn | 2770-5226 |
language | eng |
recordid | cdi_ieee_primary_10712567 |
source | IEEE Xplore All Conference Series |
subjects | Chinese Remainder Theorem Encryption encryption/decryption process Hardware hierarchical residue number systems Information technology module Reliability residues Streams |
title | Hierarchical Encryption in a Residual Number System |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T18%3A31%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Hierarchical%20Encryption%20in%20a%20Residual%20Number%20System&rft.btitle=2024%2014th%20International%20Conference%20on%20Advanced%20Computer%20Information%20Technologies%20(ACIT)&rft.au=Yakymenko,%20Igor&rft.date=2024-09-19&rft.spage=496&rft.epage=499&rft.pages=496-499&rft.eissn=2770-5226&rft_id=info:doi/10.1109/ACIT62333.2024.10712567&rft.eisbn=9798350350043&rft_dat=%3Cieee_CHZPO%3E10712567%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-ieee_primary_107125673%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10712567&rfr_iscdi=true |