Algorithms of asymmetric encryption and encapsulation of keys of post-quantum period of 5 -7 stability stability levels and their applications
DOI:
https://doi.org/10.30837/rt.2019.3.198.01Keywords:
asymmetric cipher, key encapsulation, post-quantum period, stability levelsAbstract
The asymmetric encryption and keys encapsulation in polynomial rings (algebraic lattices) built algorithms are presented and considered, the essence of used asymmetric encryption transformations and key encapsulation protocols are analyzed. Encryption and encapsulation mechanisms with different sets of parameters that determine stability are considered.References
Lily Chen Report on Post-Quatum Cryptography. NISTIR 8105 (DRAFT) / Lili Chen, Stephen Jordan, Yi-Kai-Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone // Electronic resource. Access mode: http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf.
Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process / Gorjan Alagic and others // https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8240.pdf
Gorbenko Yu.I. Methods for construction and analysis of cryptographic systems. Kharkiv : Fort, 2015. 959 p. (In Ukr.).
American National Standard X9.98-2010. Lattice-based polynomial public key encryption algorithm, Part 1: key establishment, Part 2: data encryption. 2010.
Daniel J. Bernstein NTRU Prime / Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal // Electronic resource. Access mode: https://ntruprime.cr.yp.to/ntruprime-20160511.pdf. https://bench.cr.yp.to/results-encrypt.html
Gorbenko I.D. General statements and analysis of the end-to-end encryption algorithm NTRU Prime IIT Ukraine / I.D. Gorbenko, E.G. Kachko, MV Esina // Radiotekhnika. Kharkov : KNURE, 2018. Is. 193. P. 5-16.
Gorbenko I. D. Calculation of general parameters for NTRU Prime Ukraine of 6-7 levels of stability / I. D. Gorbenko, A. N. Alekseychuk, O. G. Kachko, M. V. Yesina, I. V. Stelnik, S. O. Kandy, V. A. Bobukh, V. A. Ponomar // Telecommunications and Radio Engineering, 2019. Vol. 78, Is. 4. P.327-340. DOI: 10.1615/TelecomRadEng.v78.i4.40.
Gorbenko I.D. Methods of building general parameters and keys for NTRU Prime Ukraine of 5th–7th levels of stability. Product form / I.D. Gorbenko,O.G. Kachko, Yu.I. Gorbenko, I.V. Stelnik, S.O. Kandyi, M.V. Yesina // Telecommunications and Radio Engineering, 2019. Vol. 78, Is. 7 P. 579-594. DOI: 10.1615/TelecomRadEng.v78.i7.30.98.
CALCULATION OF GENERAL PARAMETERS FOR NTRU PRIME UKRAINE OF 6-7 LEVELS OF STABILITY / I. D. Gorbenko, A. N. Alekseychuk, O. G. Kachko, M. V. Yesina, I. V. Stelnik, S. O. Kandy, V. A. Bobukh,. A. Ponomar . pages 327-340 DOI: 10.1615/TelecomRadEng.v78.i4.40. Vol. 78, 2019 Is. 4.
Kachko O., Gorbenko I., Yesina M., Kandiy S. POLYNOMIALS MULTIPLICATION FUNCTIONS FOR ORDINARY AND PRODUCT FORM OF ONE OF THE POLYNOMIALS REPRESENTATION:
https://github.com/KandiyIIT/NTRU-POLYNOMIALS-MULTIPLICATION.
Ran Canetti, Hugo Krawczyk Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. Electronic resource. Access mode: http://iacr.org/archive/eurocrypt2001/20450451.pdf.
Post-Quantum Cryptography. Electronic resource. Access mode: https://csrc.nist.gov/projects/post-quantum-cryptography/round-1-submissions.
EUF-CMA and SUF-CMA. Electronic resource. Access mode: https://blog.cryptographyengineering.com/euf-cma-and-suf-cma/.
DSTU ISO / IEC 18033-2: 2015 (ISO / IEC 18033-2: 2006, IDT) Information Technology. Methods of Protection. Encryption Algorithms. Part 2. Asymmetric Ciphers. (In Ukr.)
Kuznetsov A., Pushkar'ov A., Kiyan N. and Kuznetsova T. Code-based electronic digital signature // 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, 2018, pp. 331-336. DOI: 10.1109/DESSERT.2018.8409154.
Kuznetsov A. A., Gorbenko Yu. І., Prokopovych-Tkachenko D. I., Lutsenko М. S., Pastukhov M. V. NIST PQC: Code-Based Cryptosystems // Telecommunications and Radio Engineering. 2019. Vol. 78. Is. 5, pp. 429-441. DOI: 10.1615/TelecomRadEng.v78.i5.50.
Gorbenko Y., Svatovskiy I. and Shevtsov O. Post-quantum message authentication cryptography based on error-correcting codes // 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, 2016. P. 51-54. DOI: 10.1109/INFOCOMMST.2016.7905333.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).