Scientific and methodological bases of analysis, evaluation and results of comparison of existing and promising (post-quantum) asymmetric cryptographic primitives of electronic signature, protocols of asymmetric encryption and key encapsulation protocols

IF 0.2 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC
Y. Gorbenko, M. Yesina, V. Ponomar, I.D. Gorbenko, E.Yu. Kapt'ol
{"title":"Scientific and methodological bases of analysis, evaluation and results of comparison of existing and promising (post-quantum) asymmetric cryptographic primitives of electronic signature, protocols of asymmetric encryption and key encapsulation protocols","authors":"Y. Gorbenko, M. Yesina, V. Ponomar, I.D. Gorbenko, E.Yu. Kapt'ol","doi":"10.30837/rt.2023.1.212.05","DOIUrl":null,"url":null,"abstract":"Currently, world civilization is taking significant steps in science and practice related to quantum calculations. Significant steps are being taken to achieve the competitive advantage of countries in the field of quantum information science and the practice of introducing quantum technologies. Scientific and practical research is first aimed at reducing the risks related to quantum computers on cybersecurity, economic and national security. Although the full range of quantum computers is still unknown, it is obvious that further technological and scientific leadership of states will at least partially depend on the country's ability to maintain a competitive advantage in quantum computing and quantum information science. However, along with the potential advantages, quantum calculations are likely to cause significant risks about economic and national security. Specific actions are determined that technologically developed states that begin a long-term process of transferring vulnerable computer systems to quantum-resistant cryptography. An important problem in cryptology is to analyze ways of reducing risks for vulnerable cryptographic systems and the state of their development, adoption and implementation at the international and national levels of post-quantum standards of asymmetric cryptotransformations of electronic signatures (ES), asymmetric ciphers (AC) and key encapsulation protocols (KEP). Therefore, the processes of reducing risks for vulnerable existing standardized cryptographic systems and determining the directions of development of mathematical methods and the study of the prospects for their application in the creation of standardized AC, KEP and ES are significantly significant. They are reduced to justification and definition of mathematical methods and mechanisms that will create promising (post-quantum) standardized AC, KEP and ES. The course of analysis, evaluation and results of comparison of existing and post-quantum asymmetric cryptotransformations of AC, KEP and ES, and standardization at the international and national levels, including for transitional and post-quantum periods, are the main objective of this article.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"125 1","pages":""},"PeriodicalIF":0.2000,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30837/rt.2023.1.212.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Currently, world civilization is taking significant steps in science and practice related to quantum calculations. Significant steps are being taken to achieve the competitive advantage of countries in the field of quantum information science and the practice of introducing quantum technologies. Scientific and practical research is first aimed at reducing the risks related to quantum computers on cybersecurity, economic and national security. Although the full range of quantum computers is still unknown, it is obvious that further technological and scientific leadership of states will at least partially depend on the country's ability to maintain a competitive advantage in quantum computing and quantum information science. However, along with the potential advantages, quantum calculations are likely to cause significant risks about economic and national security. Specific actions are determined that technologically developed states that begin a long-term process of transferring vulnerable computer systems to quantum-resistant cryptography. An important problem in cryptology is to analyze ways of reducing risks for vulnerable cryptographic systems and the state of their development, adoption and implementation at the international and national levels of post-quantum standards of asymmetric cryptotransformations of electronic signatures (ES), asymmetric ciphers (AC) and key encapsulation protocols (KEP). Therefore, the processes of reducing risks for vulnerable existing standardized cryptographic systems and determining the directions of development of mathematical methods and the study of the prospects for their application in the creation of standardized AC, KEP and ES are significantly significant. They are reduced to justification and definition of mathematical methods and mechanisms that will create promising (post-quantum) standardized AC, KEP and ES. The course of analysis, evaluation and results of comparison of existing and post-quantum asymmetric cryptotransformations of AC, KEP and ES, and standardization at the international and national levels, including for transitional and post-quantum periods, are the main objective of this article.
现有和有前途的(后量子)电子签名非对称密码原语、非对称加密协议和密钥封装协议的分析、评估和结果比较的科学和方法基础
当前,世界文明在量子计算的科学和实践方面取得了重大进展。各国在量子信息科学领域和引进量子技术的实践方面正在采取重大步骤,以实现竞争优势。科学和实践研究首先旨在降低与量子计算机相关的网络安全、经济和国家安全风险。尽管量子计算机的全系列仍然未知,但很明显,各国在技术和科学方面的进一步领导地位至少部分取决于该国在量子计算和量子信息科学方面保持竞争优势的能力。然而,随着潜在的优势,量子计算可能会对经济和国家安全造成重大风险。具体的行动被确定为技术发达的国家开始将易受攻击的计算机系统转移到抗量子密码术的长期过程。密码学中的一个重要问题是分析如何降低易受攻击的密码系统的风险,以及它们在国际和国家层面的非对称电子签名密码转换(ES)、非对称密码(AC)和密钥封装协议(KEP)的后量子标准的发展、采用和实施状况。因此,降低现有脆弱的标准化密码系统的风险,确定数学方法的发展方向,研究其在标准化AC、KEP和ES创建中的应用前景具有重要意义。它们被简化为证明和定义数学方法和机制,这些方法和机制将创造有前途的(后量子)标准化AC, KEP和ES。本文的主要目的是对AC、KEP和ES的现有和后量子非对称密码变换进行分析、评价和结果比较,并在国际和国家层面进行标准化,包括过渡和后量子时期。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia ENGINEERING, ELECTRICAL & ELECTRONIC-
自引率
33.30%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信