Main Article Content

Serhii Yevseiev
Lala Rustam Bakirova
Mariia Sushchenko


The subject are mathematical models of building hybrid (complex) cryptosystems based on Mac-Elis crypto-code constructions on damaged codes. The purpose of this work is cryptographic mechanisms design in post-quantum cryptography to provide basic security services. The use of crypto-code structures in the mechanisms of strong authentication based on OTP passwords Development of practical algorithms for their implementation based on the proposed mathematical models. The tasks: analysis of the main threats of using OTP passwords; basics of construction and using multi-channel cryptography systems on damaged codes; a formal description of mathematical models of hybrid crypto-code constructions on damaged codes based in the modified McEliece and Niederreiter crypto-code systems in elliptic curves; development of algorithms for data encryption and decryption at the Niederreiter-McEliece hybrid crypto code constructions (НССС). Conclusion: The comprehensive protection mechanisms proposed in the article ensure the use of a strong authentication protocol in post-quantum cryptography based on OTP passwords. The use of damaged codes extends the possibilities of using crypto-code structures by significantly reducing the power of the alphabet while maintaining the required level of cryptographic resistance.

Article Details

Methods of information systems protection
Author Biographies

Serhii Yevseiev, Simon Kuznets Kharkiv National University of Economics, Kharkiv

Doctor of Technical Sciences, Senior Research, Associate Professor, Head of the Department of Cybersecurity and Information Technologies

Lala Rustam Bakirova, Azerbaijan State Oil and Industry University, Baku

Doctor of Technical Sciences, Associate Professor, Head of Department “Instrumentation Engineering”

Mariia Sushchenko, University of Science and Technology of China

masters student


Scott, Rose (2016), Domain name systems-based electronic mail security, available to:

Quynh, Dang (2012), Recommendation for Applications Using Approved Hash Algorithms, available to:

Schneider, Bruce (2016), Applied cryptography. Protocols, algorithms, source texts in the C language, available to:

Digital Identity Guidelines (2018), available to:

The Cybersecurity Framework (2019), available to:

Guide to LTE Security (2019), available to:

Shapiro, Leonid (2012), Authentication and one-time passwords. Theoretical basis. Part 1, available to:

Shapiro, Leonid (2012), Authentication and one-time passwords. Part 2. Implementing OTP for authentication in AD, available to:

SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash (2019), available to:

Evseev, S.P. and Abdullaev, V.G. (2015), “Algorithm for Monitoring the Two-Factor Authentication Method Based on the Passwindow System”, East European Journal of Advanced Technologies, Issue. 2/2 (74), pp. 9–15.

Evseev, S.P., Abdullaev, Zh., Agazade, F. and Abbasova V.S. (2016), “Improvement of the method of two-factor authentication based on the use of modified crypto-code schemes”, System of information boxes, No. 9 (146), pp. 132–145.

Evseev, S.P., Kots, G.P. and Lekarev E.V. (2016), “Development of the method of multifactor authentication based on the modified Niedereiter-McEliece crypto-code systems”, East-European Journal of Advanced Technologies, 6/4 (84), pp. 11–23.

Robert, Hackett (2016), You’re implementing this basic security feature all wrong, available to:

Guide for Cybersecurity Event Recovery (2019), available to:

Security requirements for cryptographic modules (2019), available to:

Annex A: Approved Security Functions for FIPS PUB 140-2 (2019),

available to:

Annex B: Approved Protection Profiles for FIPS PUB 140-2 (2019), available to:

Annex C: Approved Random Number Generators for FIPS PUB 140-2 (2019),

available to:

Evseev, S.P., Rzaev, Kh.N. and Korol, O.G. (2016), “Development of the modified asymmetric crypto-code system of McEliece on truncated elliptic codes”, East European Journal of Advanced Technologies, Kharkiv, Is. 4/9 (82), pp. 4–12.

Mishchenko, V. A. and Vilansky, Yu. V. (2007), Damage texts and multichannel cryptography, Encyclopedic, Minsk, 292 p.

Mishchenko, V. A. ,Vilansky, Yu. V. and Lepin, V.V. (2006), The cryptographic algorithm MV 2, Minsk, 177 p.

Shannon, K.E. (1963), “The theory of communication in secret systems”, Work on the theory of information and cybernetics, Moscow, pp. 333–402.

Hryshchuk, R., Yevseiev, S. and Shmatko, A. (2018), Construction methodology of information security system of banking information in automated banking systems, monograph, Premier Publishing s. r. o., Vienna, 284 p.

Schwartz, M. J. (2011), “Zeus Banking Trojan Hits Android Phones”, Information week, available:

Trojan Writers Target UK Banks with Botnets (2010), TechWorld, available to:

Grishchuk R., Danik Yu. (2016), Fundamentals of cyber security, Zhitomir: ZHNAEU, 228 р.

Kiberbezopasnost 2016–2017: Otitogov k prognozam (2017), available to:

Rise of IoT Botnets Showcases Cybercriminals’ Ability to Find New Avenues of Attack (2019), available to:

HP research: average annual damage from cyber attacks increased up to 15 million USD for organization (2015), available to:

Data Bank of Information Security Threats (2019), available to:

Guide for Cybersecurity Event Recovery (2019), available:

Guide to LTE Security, [Online]. Available: