Analysis of potential post-quantum mechanisms of electronic signatures based on hash functions
Abstract
The results of the analysis of electronic signatures with one-time keys for the post-quantum period are given. The requirements are justified and an improved mechanism of electronic signature is presented for the criteria of spatial complexity of keys and signatures. A model of the violator and threats is proposed. The main types of attacks on the electronic signature with one-time keys are substantiated. The main relations of the post-quantum cryptanalysis complexity estimation are presented. The main recommendations and the main spheres of using the electronic signature in the post-quantum period are given.References
A RIDDLE WRAPPED IN AN ENIGMA. NEAL KOBLITZ AND ALFRED J. MENEZES Department of Mathematics, Box 354350, University of Washington, Seattle, WA 98195 U.S.A.
Lili Chen, Stephen Jordan, Yi-Kai-Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone. Report on Post – Quatum Cryptography. NISTIR 8105 (DRAFT). https://www.google.com.ua/search?
DRAFT – DRAFT – DRAFT. Proposed Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. http://www.nist.gov/pqcrypto.
Горбенко, І.Д., Кузнєцов, О.О., Потій, О.В., Горбенко, Ю.І., Ганзя, Р.С., Пономар, В.А. Постквантова криптографія та механізми її реалізації // Радиотехника. – 2016. – Вып. 186. – С. 32–52.
Leslie Lamport. Constructing digital signatures from a one way function. Technical. Report SRI-CSL-98, SRI International Computer Science Laboratory, 1979.
Andreas Hülsing. W-OTS+ – shorter signatures for hash-based signature schemes. In Amr Youssef, Abderrahmane Nitaj, and Aboul-Ella Hassanien, editors, Progress. in Cryptology – AFRICACRYPT 2013, volume 7918 of LNCS, pages 173–188.Springer, 2013.
Ralph Merkle. A certified digital signature. In Gilles Brassard, editor, Advances inCryptology – CRYPTO ’89, volume 435 of LNCS, pages 218–238. Springer, 1990.
Daniel J. Bernstein;, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, and Zooko Wilcox-O’Hearn. SPHINCS: practical stateless hash-based Signatures. djb@cr.yp.to. daira@leastauthority.com, zooko@leastauthority.com
Gorbenko, I., Ponomar, V. Examining a possibility to use and the benefits of post-quantum algorithms dependent on the conditions of their application // Eastern European Journal of Enterprise Technologies, Vol.2, Issue 9-86, 2017, Pages 21-32. http://journals.uran.ua/eejet/article/view/96321/94881.
ETSI GR QSC 001 V.1.1.1 (2016-07). Quntum-Safe Cryptography (QSC); Quantum-safe algorithmic framework.
Горбенко, Ю.І. Методи побудування та аналізу, стандартизація та застосування криптографічних системи ; за заг. ред. Горбенка І.Д. – Ха-рків : Форт, 2016. – 958с.
Gorbenko, I., Kuznetsov, A., Gorbenko, Yu., Kavun, S., Kachko, О., Yesina, M. Electronic Signature Mechanisms. The Current State, the Existing Contradictions and Prospects of Practical Use for the Post-Quantum Period: Monograph. – ASC Academic Publishing, USA, 2017. – 165 p.
Grover’s Quantum Search Algorithm [електронний ресурс] – Режим доступу: URL: http://twistedoakstudios.com/blog/Post2644_grovers-quantum-search-algorithm.
Кузнецов, А.А., Пуш-карев, А.И., Сватовский, И.И., Шевцов, А.В. Несимметричные криптосистемы на алгебраических ко-дах для пост-квантового периода // Радиотехника. – 2016. – Вып. 186. – С. 70-90.
Кузнецов, О., Горбенко, Ю., Шевцов, О., Кузнецова, Т. Дослідження криптографічних атак на схеми електронного цифрового підпису в фактор-кільцях зрізаних поліномів // Захист інформації. – Київ : Національний авіаційний університет, 2016. – Т. 18, №4, жовтень-грудень 2016. – С. 293-300.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).