Realization of the mechanism of control software integrity in post quantum period
DOI:
https://doi.org/10.30837/rt.2018.2.193.20Keywords:
public key infrastructure, hash functions, quantum cryptography, stateless signature, lifecycle, source control, web serviceAbstract
This article is devoted to description the realization of the public-key infrastructure using the stateless algorithm of digital signature with quantum-resistance. This article is detail describe the development cycle and implementation of the stateless signature scheme using the hash function of DSTU 7564:2014.References
ETSI GR QSC 001 V.1.1.1 (2016-07). Quantum-Safe Cryptography (QSC); Quantum-safe algorithmic framework.
NIST PQC workshop: SAFEcrypto Project, M. O’Niell. 2015.
NIST Workshop on Cyber Security in a Post-Quantum World (2015).
PQCrypto project, T Lange.
PQCrypto. Initial recommendation of Long-term secure post-quantum systems.
Endignoux G. Design and implementation of a post-quantum hash-based cryptographic signature scheme: mater’s thesis:july 2017 /Guillaume Endignoux – Switzerland,2017. 42 p.
Gravity-Sphincs : Kudelski Security : 25 p./Jean-Philippe Aumasson, Guillaume Endignoux.
Becjer G. Merkle signature schemes, Merkle Trees and Their Cryptanalusis: 2013.
Gorbenko Yu.І., (2015), Construction and analysis of systems, protocols, and methods of cryptographic information protection. Pt. 1, Methods of construction and analysis, standardization and application of cryptographic systems, Kharkiv, Ukraine: Fort, (in Ukrainian).
Ellingwood. J. CI/CD tools comparison: Jenkins,Gitlab CI etc.[Internet resource]/ Justin Ellingwood. [Access mode]: https://www.digitalocean.com/community/tutorials/ci-cd-tools-comparison-jenkins-gitlab-ci-buildbot-drone-and-concourse
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).