Порівняльний аналіз постквантових асиметричних алгоритмів шифрування

Due to the development of technologies for quantum computing and the introduction of quantum computer, there is a threat to the current state of protection of cryptographic systems with a public key. With an advent of quantum computer that would have the volume of register required for the methods o...

Full description

Saved in:
Bibliographic Details
Date:2019
Main Authors: Онопрієнко, Віктор Васильович, Пономар, Володимир Андрійович
Format: Article
Language:Ukrainian
Published: Kamianets-Podilskyi National Ivan Ohiienko University 2019
Online Access:http://mcm-tech.kpnu.edu.ua/article/view/173756
Tags: Add Tag
No Tags, Be the first to tag this record!
Journal Title:Mathematical and computer modelling. Series: Technical sciences

Institution

Mathematical and computer modelling. Series: Technical sciences
Description
Summary:Due to the development of technologies for quantum computing and the introduction of quantum computer, there is a threat to the current state of protection of cryptographic systems with a public key. With an advent of quantum computer that would have the volume of register required for the methods of quantum cryptanalysis, the stability of existing crypto algorithms will significantly degrade. This necessitates the creation of algorithms resistant to the methods of quantum cryptanalysis. The European project «New European Schemes for Signatures, Integrity, and Encryptions» (NESSIE) and the National Institute of Standards and Technologies (NIST) of the USA announced a start of recruiting the applicants for the contest of post-quantum algorithms whose standards are planned to be adopted over 2020–2022. In order to compare, a procedure for evaluation was selected based on integral assessments of unconditional and conditional criteria. An analysis was conducted among the algorithms that fulfilled general unconditional criteria. As conditional criteria, we chose numerical characteristics of algorithms. In addition, additional unconditional criteria were put forward.A relevant task is the comparative analysis and evaluation of a possibility to use the post-quantum mechanisms, which are represented by the algorithms that already exist, depending on the conditions of applying them. At present, only the possibility of using the appropriate crypto transformations over a post-quantum period is being examined, but the analysis of advantages of one over another has not been run yet. In addition, it is necessary to evaluate the very possibility to use such algorithms taking into account those constraints that are imposed by the existing information systems.Results of present research allow us to understand current state in the development of post-quantum crypto algorithms and to predict their possible further development.This forecast is important in that the post-quantum cryptographic mechanisms represent a new stage in the development and use of cryptography. In addition, the practical value of the research consists in obtaining the evaluation for post-quantum algorithms.