Abstract
This article investigates a proposed model of cross-border exchange and information security in the cross-border interaction in the integration system. A structural scheme of protected cross-border information exchange is proposed. Cross-border interaction of sides for information exchange in the integrated system is provided by the creation and use of the integration segment and national segments. The main tasks of a trusted third party are formulated. The model of sides’ interaction scheme of the integration system using the integration gateway is presented. In this paper, a model of modified nonconventional digital signature system based on the scheme of the Digital Signature Algorithm and nonpositional polynomial number systems (NPNs) are described. Application of NPNs allows creating effective cryptographic systems of high reliability, which enables the confidentiality, authentication, integrity of stored and transmitted information.
References
[1] The concept of using in interstate information service interactions and legally binding electronic documents, 2014, http:// www.tks.ru/news/law/2014/10/08/0006 Search in Google Scholar
[2] Sazonov A.V., Subjects and technology rights management infrastructure in transboundary space General information security concerns and objects, 2012, 3, 83–87 Search in Google Scholar
[3] Model Law on cross-border information exchange of electronic documents, 2015, http://www.pvti.ru/ Search in Google Scholar
[4] Akushskii I.Ya., Juditskii D.I., Machine Arithmetic in Residue Classes, Sov. Radio, Moscow, 1968, 439, (in Russian) Search in Google Scholar
[5] Bijashev R.G., Nyssanbayeva S.E., Algorithm for Creation a Digital Signature with Error Detection and Correction, Cybernetics and Systems Analysis, 2012, 4, 489–497 10.1007/s10559-012-9428-5Search in Google Scholar
[6] Biyashev R., Nyssanbayeva S., Begimbayeva Y., Magzom M., Modification of the Cryptographic Algorithms Developed on the Basis of Nonpositional Polynomial Notations, Proceedings of the International Conference on Circuits, Systems, Signal Processing, Communications and Computers, (15-17 March 2015, Vienna, Austria), 2015, 170–176 Search in Google Scholar
[7] Biyashev R.G., Development and research of pass-through method for increase of reliability of data exchange systems in distributed control: Dis. degree for obtaining. Doctor Tech. Sci., Moscow, 1985, 328 Search in Google Scholar
[8] Pohst M., Zassenhaus H., Eds., Algorithmic algebraic number theory, New York, NY, USA: Cambridge University Press, 1989 10.1017/CBO9780511661952Search in Google Scholar
[9] Biyashev R.G., Nyssanbayeva S.E., Kapalova N.A., Private keys for non-positional cryptosystems, Development, research and application. LAP LAMBERT Academic Publishing, Germany, 2014, 126 Search in Google Scholar
[10] Nyssanbayeva S.E., Development and research of cryptographic systems based on nonpositional polynomial notations: Dis. degree for obtaining. Doctor Tech.Sci., Almaty, 2009, 240 Search in Google Scholar
[11] ElGamal T., A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, 1985, v. IT-31, 4, 469–472 10.1109/TIT.1985.1057074Search in Google Scholar
[12] FIPS PUB 186, Digital Signature Standard, http://csrc.nist.gov/ publications/PubsFIPS.html Search in Google Scholar
[13] Biyashev R., Nyssanbayeva S., Begimbayeva Ye., Magzom M. Building modified modular cryptographic systems, International journal of applied mathematics and informatics, 2015, 9, 103–109 Search in Google Scholar
©2016 R. G. Biyashev et al.
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.