Properties of the Rainbow multi-variant algorithm and its ability to resist various crypto-analysis methods and attack by outside channels

Authors

  • D.V. Harmash

DOI:

https://doi.org/10.30837/rt.2021.2.205.07

Keywords:

Rainbow, cryptanalysis, vulnerability, minrank, scheme, algorithm

Abstract

This work presents the analysis of the essence and possibilities of protection of the Rainbow post-quantum cryptographic algorithm. The main properties of the Rainbow algorithm and the general essence of cryptographic encryption and electronic signature algorithms based on multivariate quadratic transformations are determined. The main provisions regarding the protocols are given. Analyses are given regarding the ability to protect the algorithm against various attacks. The vulnerability of the algorithm to attack by third-party channels is investigated. The general provisions of the algorithm are considered. The algorithm is presented and considered from a mathematical point of view, as well as the mathematical essence of cryptographic algorithms for encryption and electronic signature based on multivariate quadratic transformations. The application of various methods of cryptanalysis against cryptographic algorithm based on multivariate quadratic Rainbow transformations is studied. The method of decreasing rank against the Rainbow algorithm is analyzed. The method of cryptanalysis by attacking the Oil-Vinegar scheme and the method of cryptanalysis "minranku method" are investigated. The attack is studied using a multilayer structure.

References

Lili Chen, Stephen Jordan, Yi-Kai-Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone. Report on Post – Quatum Cryptography. Nistir 8105 (draft).

Інтернет-ресурс. Режим доступу http://www.nkj.ru/archive/articles/5309/

Інтернет-ресурс. Режим доступу http://www.win.tue.nl/diamant/symposium05/abstracts/wolf.pdf

Горбенко Ю.І. Методи побудування та аналізу, стандартизація та застосування криптографічних систем : монографія ; заг. ред. І.Д. Горбенко. Харків : Форт, 2015. 959 с.

Потій О.В, Горбенко Ю.І., Ганзя Р.С., Пономар В.І. // Матеріали V міжнар. наук.-техн. конф. «Захист інформації і безпеки інформаційних систем». Львів, 2016, 02.06 – 03.06. С. 52.

Reinier Broker. Constructing supersingular elliptic curves // J. Comb. Number Theory, (3): pp. 269–273, 2009.

McGrew D., Curcio M. Hash-Based Signatures draft-mcgrew-hash-sigs-00[Электронный ресурс]. Режим доступу: https://tools.ietf.org/html/draftmcgrew-hash-sigs-00.

Lili Chen, Stephen Jordan, Yi-Kai-Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone. Report on Post – Quantum Cryptography. NISTIR 8105 (DRAFT). https://www.google.com.ua/search.

Bernstein D. J. Grover vs. McEliece // N. Sendrier, editor, Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings, volume 6061 of Lecture Notes in Computer Science, pages 73–80. Springer, 2010.

Published

2021-07-02

How to Cite

Harmash , D. . (2021). Properties of the Rainbow multi-variant algorithm and its ability to resist various crypto-analysis methods and attack by outside channels. Radiotekhnika, 2(205), 79–84. https://doi.org/10.30837/rt.2021.2.205.07

Issue

Section

Articles