Application of hierarchic authentication to isogenies of elliptic curves for providing safety of data routing in the systems of analysis of digital production traffic
The article discusses the peculiarities of the process of information routing in the course of acquisition and processing big data of digital production, including systems of traffic analysis. Such a specific features variability of physical nodes-processors with the retention of functional stringency of order of information processing is distinguished. Inordertoprovidesafetyofthedescribedprocessofinformationprocessingand possibility of restoration of a chain of processing every fragment of data, the authors offer a protocol of hierarchic authentication developed thereby on isogenies of elliptic curves. The work includes algorithms of shaping parameters, generation of keys, generation and checking signature. The evaluation of signature stability again basic types of attacks has been performed. A solution offered by the authors can be used both in traditional and, in future, in quantum systems. A simulation of corresponding signature dimensions has been performed in the work.