RAINBOW algorithm and its ability to resist RBS attacks and third party channels

Authors

  • D.V. Harmash Харківський національний університет імені В. Н. Каразіна, Ukraine

DOI:

https://doi.org/10.30837/rt.2022.2.209.05

Keywords:

Rainbow, cryptanalysis, vulnerability, minrank, scheme, algorithm

Abstract

The essence and possibilities of protecting the Rainbow post-quantum cryptographic algorithm are considered. The main properties of algorithms based on multidimensional quadratic transformations are studied. An assessment is given of what resources and computational energy are needed for the successful use of algorithms based on multidimensional quadratic transformations. The ability to protect the algorithm against attacks by third-party channels is analyzed. It is studied how successfully a cryptographic algorithm based on Rainbow multivariate quadratic transformations can withstand RBS attacks. A detailed description of the steps used to build an attack on a cryptographic algorithm based on Rainbow multivariate quadratic transforms is given. A structural analysis of the Rainbow algorithm is performed. Detailed conclusions are made regarding the performed analyzes. An assessment of the stability and complexity of the cryptographic encryption algorithm and electronic signature based on multivariate quadratic transformations is given.

References

Lili Chen, Stephen Jordan, Yi-Kai-Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone. Report on Post – Quatum Cryptography. Nistir 8105 (draft).

Інтернет-ресурс. Режим доступу http://www.nkj.ru/archive/articles/5309/

Горбенко Ю.І. Методи побудування та аналізу, стандартизація та застосування криптографічних систем : монографія ; зааг. ред. І.Д. Горбенко. Харків : Форт, 2015. 959 с

Потій О.В, Горбенко Ю.І., Ганзя Р.С., Пономар В.І. // Матеріали V-ї міжнар. наук.-техн. конф. «Захист інформації і безпеки інформаційних систем». Львів, 2016, 02.06 – 03.06. С. 52.

Reinier Broker. Constructing supersingular elliptic curves // J. Comb. Number Theory, (3): pp. 269–273, 2009.

McGrew D., Curcio M. Hash-Based Signatures draft-mcgrew-hash-sigs00[Електронний ресурс]. Режим доступу: https://tools.ietf.org/html/draftmcgrew-hash-sigs-00.

Lili Chen, Stephen Jordan, Yi-Kai-Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone. Report on Post – Quantum Cryptography. NISTIR 8105 (DRAFT). https://www.google.com.ua/search?

Bernstein D. J. Grover vs. McEliece // N. Sendrier, editor, Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010 // Proceedings, volume 6061 of Lecture Notes in Computer Science, pages 73–80. Springer, 2010.

Published

2022-06-24

How to Cite

Harmash, D. . (2022). RAINBOW algorithm and its ability to resist RBS attacks and third party channels. Radiotekhnika, 2(209), 59–63. https://doi.org/10.30837/rt.2022.2.209.05

Issue

Section

Articles