Analysis and research of digital signature algorithm Picnic
Keywords:analysis of known attacks, block stream ciphers, public key, hash functions, key pairs, post-quantum algorithm Picnic, post-quantum security, encryption standards, secret key, digital signature, LowMC
An important feature of the post-quantum period in cryptography is the significant uncertainty regarding the source data for cryptanalysis and counteraction in terms of the capabilities of quantum computers, their mathematical and software, as well as the application of quantum cryptanalysis to existing cryptotransformations and cryptoprotocols. Mathematical methods of digital signature (DS) have been chosen as the main methods of NIST USA, which have undergone significant analysis and substantiation in the process of extensive research by cryptographers and mathematicians at the highest level. They are described in detail and studied at the first stage of the US NIST International Competition. In the second round, a number of decisions were made to merge some candidates for the post-quantum DS standard. 9 candidates were left for further research at the 2nd round: Crystals-Dilithium, Falcon, GeMSS, LUOV, MQDSS, Picnic, qTESLA, Rainbow and SPHINCS+. Three of them (Dilithium, Falcon, qTeSLA) are based on the stability of algebraic lattices (Lattice-based), four (GeMSS, LUOV, MQDSS, Rainbow) are based on multivariate transformations (MQ-transformations), one (SPHINCS+) is based on the stability of hash-function, one (Picnic) is based on the stability of the hash-function and block stream ciphers. During the 2nd round of the US NIST Competition the following finalist algorithms and alternative algorithms were selected as digital signatures according to the results of research on promising post-quantum cryptographic algorithms. As finalists algorithms such DS algorithms as Crystals-Dilithium, Falcon and Rainbow. Alternative algorithms are GeMSS, Picnic and SPHINCS+ were selected. This paper studies the peculiarities of construction of the digital signature algorithm considered as a candidate for the promising post-quantum standard of the NIST PQC competition – Picnic, also it analyzes the protection of the algorithm from known attacks. Data from the comparison of post-quantum algorithms such as digital signature are given. The description of the Picnic algorithm and its parameters are given.
Daniel Kales Efficient FPGA Implementations of LowMC and Picnic / Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner. Режим доступу: https://eprint.iacr.org/2019/1368.pdf.
The Picnic Signature Scheme. Design Document / Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha //. November 29, 2017. Version 1.0. Режим доступу: https://csrc.nist.gov/Projects/post-quantum-cryptography/round-1-submissions.
The Picnic Signature Scheme Design Document / Melissa Chase, David Derler, Steven Goldfeder, Jonathan Katz, Vladimir Kolesnikov, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Xiao Wang, Greg Zaverucha. March 30, 2019. Version 2.0. Режим доступу: https://csrc.nist.gov/Projects/post-quantum-cryptography/round-2-submissions.
NIST submissions. Picnic. Picnic-FS. Picnic-UR. Non-interactive Proof of Knowledge. Електронний ре-сурс. Режим доступу: https://pqc-wiki.fau.edu/w/Special:DatabaseHome.
Itai Dinur The Picnic Post-Quantum Signature Scheme and its Security Analysis. Режим доступу: https://www.cs.technion.ac.il/~biham/Workshops/Cryptoday/2018/Slides/cryptoday-2018-itai-dinur-picnic.pdf.
Горбенко І. Д. Методи, методика та результати порівняльного аналізу кандидатів на постквантовий стандарт електронного підпису / І. Д. Горбенко, О. Г. Качко, М. В. Єсіна, В. А. Пономар // ХХ Ювілейна Міжнар. наук.-практ. конф. "Безпека інформації в інформаційно-телекомунікаційних системах", 22-24 травня, 2018, м. Буча. С. 96-97.
Gorbenko I. Electronic signature mechanisms. The Current State, the Existing Contradictions and Prospects of Practical Use for the Post-Quantum Period / I. Gorbenko, A. Kuznetsov, Yu. Gorbenko, S. Kavun, О. Kachko, M. Yesina // ASC Academic Publishing Minden, Nevada, USA, 2017. 165 p.
How to Cite
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).