Algorithms of asymmetric encryption and encapsulation of keys of post-quantum period of 5 -7 stability stability levels and their applications

Authors

  • I.D. Gorbenko
  • O.G. Kachko
  • O.M. Oleksijchuk
  • O.O. Kuznetsov
  • Yu.I. Gorbenko
  • V.V. Onoprienko
  • M.V. Yesina
  • S.O. Kandy

DOI:

https://doi.org/10.30837/rt.2019.3.198.01

Keywords:

asymmetric cipher, key encapsulation, post-quantum period, stability levels

Abstract

The asymmetric encryption and keys encapsulation in polynomial rings (algebraic lattices) built algorithms are presented and considered, the essence of used asymmetric encryption transformations and key encapsulation protocols are analyzed. Encryption and encapsulation mechanisms with different sets of parameters that determine stability are considered.

References

Lily Chen Report on Post-Quatum Cryptography. NISTIR 8105 (DRAFT) / Lili Chen, Stephen Jordan, Yi-Kai-Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone // Electronic resource. Access mode: http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf.

Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process / Gorjan Alagic and others // https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8240.pdf

Gorbenko Yu.I. Methods for construction and analysis of cryptographic systems. Kharkiv : Fort, 2015. 959 p. (In Ukr.).

American National Standard X9.98-2010. Lattice-based polynomial public key encryption algorithm, Part 1: key establishment, Part 2: data encryption. 2010.

Daniel J. Bernstein NTRU Prime / Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal // Electronic resource. Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf. https://bench.cr.yp.to/results-encrypt.html

Gorbenko I.D. General statements and analysis of the end-to-end encryption algorithm NTRU Prime IIT Ukraine / I.D. Gorbenko, E.G. Kachko, MV Esina // Radiotekhnika. Kharkov : KNURE, 2018. Is. 193. P. 5-16.

Gorbenko I. D. Calculation of general parameters for NTRU Prime Ukraine of 6-7 levels of stability / I. D. Gorbenko, A. N. Alekseychuk, O. G. Kachko, M. V. Yesina, I. V. Stelnik, S. O. Kandy, V. A. Bobukh, V. A. Ponomar // Telecommunications and Radio Engineering, 2019. Vol. 78, Is. 4. P.327-340. DOI: 10.1615/TelecomRadEng.v78.i4.40.

Gorbenko I.D. Methods of building general parameters and keys for NTRU Prime Ukraine of 5th–7th levels of stability. Product form / I.D. Gorbenko,O.G. Kachko, Yu.I. Gorbenko, I.V. Stelnik, S.O. Kandyi, M.V. Yesina // Telecommunications and Radio Engineering, 2019. Vol. 78, Is. 7 P. 579-594. DOI: 10.1615/TelecomRadEng.v78.i7.30.98.

CALCULATION OF GENERAL PARAMETERS FOR NTRU PRIME UKRAINE OF 6-7 LEVELS OF STABILITY / I. D. Gorbenko, A. N. Alekseychuk, O. G. Kachko, M. V. Yesina, I. V. Stelnik, S. O. Kandy, V. A. Bobukh,. A. Ponomar . pages 327-340 DOI: 10.1615/TelecomRadEng.v78.i4.40. Vol. 78, 2019 Is. 4.

Kachko O., Gorbenko I., Yesina M., Kandiy S. POLYNOMIALS MULTIPLICATION FUNCTIONS FOR ORDINARY AND PRODUCT FORM OF ONE OF THE POLYNOMIALS REPRESENTATION:

https://github.com/KandiyIIT/NTRU-POLYNOMIALS-MULTIPLICATION.

Ran Canetti, Hugo Krawczyk Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. Electronic resource. Access mode: http://iacr.org/archive/eurocrypt2001/20450451.pdf.

Post-Quantum Cryptography. Electronic resource. Access mode: https://csrc.nist.gov/projects/post-quantum-cryptography/round-1-submissions.

EUF-CMA and SUF-CMA. Electronic resource. Access mode: https://blog.cryptographyengineering.com/euf-cma-and-suf-cma/.

DSTU ISO / IEC 18033-2: 2015 (ISO / IEC 18033-2: 2006, IDT) Information Technology. Methods of Protection. Encryption Algorithms. Part 2. Asymmetric Ciphers. (In Ukr.)

Kuznetsov A., Pushkar'ov A., Kiyan N. and Kuznetsova T. Code-based electronic digital signature // 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, 2018, pp. 331-336. DOI: 10.1109/DESSERT.2018.8409154.

Kuznetsov A. A., Gorbenko Yu. І., Prokopovych-Tkachenko D. I., Lutsenko М. S., Pastukhov M. V. NIST PQC: Code-Based Cryptosystems // Telecommunications and Radio Engineering. 2019. Vol. 78. Is. 5, pp. 429-441. DOI: 10.1615/TelecomRadEng.v78.i5.50.

Gorbenko Y., Svatovskiy I. and Shevtsov O. Post-quantum message authentication cryptography based on error-correcting codes // 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, 2016. P. 51-54. DOI: 10.1109/INFOCOMMST.2016.7905333.

Downloads

How to Cite

Gorbenko, I., Kachko, O., Oleksijchuk, O., Kuznetsov, O., Gorbenko, Y., Onoprienko, V., Yesina, M., & Kandy, S. (2019). Algorithms of asymmetric encryption and encapsulation of keys of post-quantum period of 5 -7 stability stability levels and their applications. Radiotekhnika, 3(198), 5–18. https://doi.org/10.30837/rt.2019.3.198.01

Issue

Section

Articles