Method for quality evaluation of trit pseudorandom sequence to cryptographic applications

Authors

  • Serhii Hnatiuk National Aviation University, Kyiv,, Ukraine
  • Tetiana Zhmurko National Aviation University, Kyiv,, Ukraine
  • Vasyl Kinzeriavyi National Aviation University, Kyiv,, Ukraine
  • Nurhul Seilova Kazakh National Research Technical University n. a. K.I. Satpayev, Almaty,, Kazakhstan

DOI:

https://doi.org/10.20535/2411-1031.2015.3.2.60891

Abstract

Developments in quantum cryptography are carried by almost all major western telecommunication companies and research centers. Rapid development led to a significant expansion of the protocols range. From viewpoint of information capacity the most effective protocols for quantum cryptography system is trit systems. However, there is a problem of developing trit pseudorandom sequences generators and assessing their quality. This is because random and pseudo-random sequence generated by different generators for cryptographic applications must be tested by probabilistic and statistical methods. However, the vast majority of known techniques focused on testing generators pseudorandom binary sequences, so confirm pseudorandom generated trit sequences using them is almost impossible. Also there are not existed software and methods of such sequences assessment and arises the task of method developing for evaluation the quality of ternary pseudorandom sequences to evaluate the feasibility of using them for cryptographic applications. That method was developed in this paper and it is based on the approach used in NIST STS.

Keywords: quantum cryptography, trit, qutrit, pseudorandom sequence, pseudorandom sequences generator, quality assessment.

Author Biographies

Serhii Hnatiuk, National Aviation University, Kyiv,

candidate of technical sciences,
associate professor of IT-security
academic department

Tetiana Zhmurko, National Aviation University, Kyiv,

assistant of IT-security
academic department

Vasyl Kinzeriavyi, National Aviation University, Kyiv,

candidate of technical sciences,
associate professor of IT-security
academic department

Nurhul Seilova, Kazakh National Research Technical University n. a. K.I. Satpayev, Almaty,

candidate of technical sciences,
head of information security
academic department

References

Korchenko, O., Vasiliu, E., Gnatyuk, S. (2010), Modern quantum technologies of information security, Aviation. Vilnius: Technika, Vol. 14, No. 2, pp. 58-69.

Nilsen, M., Chang, I. (2006), Kvantovye vychisleniia i kvantovaia informatciia [Quantum computing and quantum information], Mir Publ., Moskow, 824 p.

Kinzeryavyy, V., Vasiliu, E., Gnatuyk, S., Zhmurko, T. (2012), Novyi metod pidsylennia sekretnosti pinh-ponh protokolu z paramy pereplutanykh kutrytiv [The new method of ping-pong protocol secrecy amplification with pairs of entangled qutrits], Ukrainian scientific journal of information security, №2 (55), pp. 5-13.

Gnatyuk, S., Zhmurko, T., Falat, P. (2015), Efficiency Increasing Metod for Quantum Secure Direct Communication Protocols, The 8th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Warsaw, Poland, pр. 125-130.

Gnatyuk, S., Zhmurko, T., Kinzeryavyy, V., Seilova, N. (2015), Metod heneruvannia trytovykh psevdovypadkovykh poslidovnostei dlia system kvantovoi kryptohrafii [Method of pseudorandom trit sequences generating for quantum cryptography systems], Ukrainian Scientific Journal of Information Security, Vol. 22, Iss. 2, pp. 140-147.

NIST STS, available at : http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_ software.html (accessed : 26 September 2015).

Knuth, D. (1977), Iskusstvo programmirovaniia dlia EVM Poluchislennye algoritmy [The Art of Computer Programming. Seminumerical Algorithms. Vol. 2] Mir Publ., Moskow, 700 p.

Marsaglia G. DIEHARD StatisticalTests, available at : http://stat.fsu.edu/~geo/ diehard.html (accessed : 06 Oktober 2015).

Published

2015-12-31

How to Cite

Hnatiuk, S., Zhmurko, T., Kinzeriavyi, V., & Seilova, N. (2015). Method for quality evaluation of trit pseudorandom sequence to cryptographic applications. Collection "Information Technology and Security", 3(2), 108–116. https://doi.org/10.20535/2411-1031.2015.3.2.60891

Issue

Section

CRYPTOLOGY