Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia最新文献

筛选
英文 中文
Side-channel attacks on CRYSTALS-KYBER, countermeasures and comparison with SKELYA (DSTU 8961-2019) CRYSTALS-KYBER的侧信道攻击、对抗及与SKELYA的比较
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.02
Yaroslav Derevianko, I.D. Gorbenko
{"title":"Side-channel attacks on CRYSTALS-KYBER, countermeasures and comparison with SKELYA (DSTU 8961-2019)","authors":"Yaroslav Derevianko, I.D. Gorbenko","doi":"10.30837/rt.2023.1.212.02","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.02","url":null,"abstract":"Although the mathematical problems used in post-quantum cryptography algorithms appear to be mathematically secure, a class of attacks known as side-channel attacks may prove to be a threat to the security of such algorithms. Side-channel attacks affect the hardware on which the cryptographic algorithm runs, they are not attacks on the algorithm itself. \u0000The good news is that side-channel analysis on new post-quantum cryptographic algorithms started early, even before the algorithms were standardized, given that older algorithms still face side-channel problems. \u0000Kyber is a lattice-based post-quantum algorithm based on the complexity of the M-LWE problem. Kyber offers a secure public key encryption (PKE) scheme against a chosen plaintext attack (CPA) and a secure key encapsulation mechanism against a chosen ciphertext attack (CCA). \u0000This paper provides a study of side-channel and fault-injection attacks on lattice-based schemes, with focus on the Kyber (KEM). \u0000Considering the wide range of known attacks, the protection of the algorithm requires the implementation of individual countermeasures. The paper presents and tests a number of countermeasures capable of providing/improving protection against existing SCA/FIA for Kyber KEM. \u0000The obtained results show that the presented countermeasures incur a reasonable performance cost. Therefore, the use of special countermeasures in real implementations of lattice-based schemes, either alone or as an augmentation of general countermeasures, is necessary.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"168 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83337009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scientific and methodological bases of analysis, evaluation and results of comparison of existing and promising (post-quantum) asymmetric cryptographic primitives of electronic signature, protocols of asymmetric encryption and key encapsulation protocols 现有和有前途的(后量子)电子签名非对称密码原语、非对称加密协议和密钥封装协议的分析、评估和结果比较的科学和方法基础
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.05
Y. Gorbenko, M. Yesina, V. Ponomar, I.D. Gorbenko, E.Yu. Kapt'ol
{"title":"Scientific and methodological bases of analysis, evaluation and results of comparison of existing and promising (post-quantum) asymmetric cryptographic primitives of electronic signature, protocols of asymmetric encryption and key encapsulation protocols","authors":"Y. Gorbenko, M. Yesina, V. Ponomar, I.D. Gorbenko, E.Yu. Kapt'ol","doi":"10.30837/rt.2023.1.212.05","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.05","url":null,"abstract":"Currently, world civilization is taking significant steps in science and practice related to quantum calculations. Significant steps are being taken to achieve the competitive advantage of countries in the field of quantum information science and the practice of introducing quantum technologies. Scientific and practical research is first aimed at reducing the risks related to quantum computers on cybersecurity, economic and national security. Although the full range of quantum computers is still unknown, it is obvious that further technological and scientific leadership of states will at least partially depend on the country's ability to maintain a competitive advantage in quantum computing and quantum information science. However, along with the potential advantages, quantum calculations are likely to cause significant risks about economic and national security. Specific actions are determined that technologically developed states that begin a long-term process of transferring vulnerable computer systems to quantum-resistant cryptography. An important problem in cryptology is to analyze ways of reducing risks for vulnerable cryptographic systems and the state of their development, adoption and implementation at the international and national levels of post-quantum standards of asymmetric cryptotransformations of electronic signatures (ES), asymmetric ciphers (AC) and key encapsulation protocols (KEP). Therefore, the processes of reducing risks for vulnerable existing standardized cryptographic systems and determining the directions of development of mathematical methods and the study of the prospects for their application in the creation of standardized AC, KEP and ES are significantly significant. They are reduced to justification and definition of mathematical methods and mechanisms that will create promising (post-quantum) standardized AC, KEP and ES. The course of analysis, evaluation and results of comparison of existing and post-quantum asymmetric cryptotransformations of AC, KEP and ES, and standardization at the international and national levels, including for transitional and post-quantum periods, are the main objective of this article.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"125 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78456833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Models of threats to cloud services 云服务的威胁模型
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.04
M.V. Yesina, V.V. Onoprienko, A.V. Tolok
{"title":"Models of threats to cloud services","authors":"M.V. Yesina, V.V. Onoprienko, A.V. Tolok","doi":"10.30837/rt.2023.1.212.04","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.04","url":null,"abstract":"Cloud services have become popular due to their advantages over traditional computing. The cloud provides remote access to software, hardware, and other services. This has allowed companies to be more productive and enabled remote work. Cloud services have fewer hardware and infrastructure requirements, which reduces the cost of maintaining and supporting information technology. The future success of organizations will depend, not least, on the extent to which they implement cloud computing in their operations. According to forecasts, spending on cloud IT technologies will continue to grow and in 2025 will exceed spending on traditional IT technologies. Security of cloud services is becoming a critical issue as more and more companies complete their digital transformation. Despite the many benefits, cloud services also face their own security threats and challenges. Since cloud services store and process a significant amount of sensitive information, a cloud breach can lead to data leaks that can hinder business development and cause significant damage to a company's reputation. There are risks associated with the unavailability of cloud services in case of technical problems and dependence on external providers. Therefore, companies should carefully assess potential threats and take appropriate measures to protect their data and business in general when using cloud services. There are many methods to help determine how prepared your organization is for the growing number of threats. Threat modeling is one of the methods for predicting and preparing for possible threats. Using modeling frameworks allows you to allocate resources and plan possible actions during an attack. There are many modeling frameworks available, but it is important to remember that these frameworks have their advantages and disadvantages, so the choice depends on the context and needs of a particular system. Analyzing, evaluating, and comparing existing methods for modeling and protecting against threats in cloud services is the main objective of this article.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"76 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88522719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating a call center test bench for load balancing Asterisk servers in a cluster 创建呼叫中心测试平台,用于集群中的Asterisk服务器负载均衡
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.18
L.O. Tokar, O.A. Koltakov, V.Y. Tsyliuryk
{"title":"Creating a call center test bench for load balancing Asterisk servers in a cluster","authors":"L.O. Tokar, O.A. Koltakov, V.Y. Tsyliuryk","doi":"10.30837/rt.2023.1.212.18","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.18","url":null,"abstract":"The article deals with the issues of increasing throughput in call centers. The current solution is to cluster call servers and evaluate their characteristics to ensure efficient operation and the necessary fault tolerance. It is shown that one of the main aspects of the quality functioning of the call center is load balancing of servers in the cluster. \u0000The features of the call-center modeling process are considered. The organization scheme of the call center of the company and the network model of the call center have been created. Virtualization technology was used to create a network model of a call center. The VMWare ESXI 6.7 hypervisor and the vCenter client were used as a network configuration platform. \u0000An analysis of load balancing was carried out using different algorithms and strategies. \u0000Asterisk PBX was configured and a server cluster was created. A test bench was developed and configured using the Zabbix open source product to explore a cluster of call servers. A bandwidth characteristic for the Asterisk _1 server and a network map were obtained, which actually represents a simulated structure of the call center network. \u0000The process of load testing on three Asterisk servers and the implementation of Zabbix load balancing capabilities are shown. A custom SIPp session script has been created for accepting calls and load testing. The number of calls that the call center is able to handle is calculated. It has been determined that a single Asterisk server with its current settings can handle a maximum of 915 concurrent calls. The process of load balancing on a cluster of SIP servers has been launched. A cluster of Asterisk servers has been found to be capable of handling 2550 simultaneous calls.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"30 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74534041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods and means of static and dynamic code analysis 静态和动态代码分析的方法和手段
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.01
A.O. Gapon, V.M. Fedorchenko, О.V. Sievierinov
{"title":"Methods and means of static and dynamic code analysis","authors":"A.O. Gapon, V.M. Fedorchenko, О.V. Sievierinov","doi":"10.30837/rt.2023.1.212.01","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.01","url":null,"abstract":"The purpose of the article is to explore the methods and tools used to analyze software code in order to identify errors and potential problems. Static and dynamic code analysis are key processes in software development, as they allow you to detect errors in the early stages of development, reduce the risk of problems later and ensure high quality of the software product. The article discusses various methods and means of static and dynamic code analysis. For each method and tool, examples of their use and advantages and disadvantages are described. \u0000The article will be useful for software developers who want to improve the quality of their products and reduce the risk of problems. It will provide readers with an in-depth understanding of code analysis techniques and tools and help them choose the most appropriate tool for their needs.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"11 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79686712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying factorization to increase the resolving ability of the parametric estimation of the power spectral density 采用因式分解提高功率谱密度参数估计的分辨能力
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.08
V.A. Tikhonov, V.M. Bezruk
{"title":"Applying factorization to increase the resolving ability of the parametric estimation of the power spectral density","authors":"V.A. Tikhonov, V.M. Bezruk","doi":"10.30837/rt.2023.1.212.08","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.08","url":null,"abstract":"We consider a possibility of the factorization of parametric spectral power density (PSM) estimation of a random process based on autoregressive linear prediction model to increase the spectrum resolution. Factorization refers to the decomposition of the multimode PSM into simpler single-mode components. Factorization makes it possible not only to decompose a complex multimode PSM into simple single-mode components, but also to analyze more accurately the low-, medium- and high-frequency components of the SPM of a random process. The main attention is paid to the study of the problem of increasing the resolving power of SPM estimation by its factorization by the Yule-Walker and Berg method.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"70 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79106766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed processing of radar information in airspace surveillance systems 空域监视系统中雷达信息的分布式处理
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.15
I.V. Svyd, S.V. Starokozhev
{"title":"Distributed processing of radar information in airspace surveillance systems","authors":"I.V. Svyd, S.V. Starokozhev","doi":"10.30837/rt.2023.1.212.15","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.15","url":null,"abstract":"The work is dedicated to the analysis of the quality of combining assessments of the radar signals and airborne objects detections in the implementation of distributed processing of radar information of airspace surveillance systems. The main sources of radar information about the air situation in the airspace control system are primary surveillance radars, secondary radar systems and identification systems on the basis of \"friend or foe\". It should be noted that the analysis of the information security of single-position radars shows their vulnerability in a wide range of unintentional and intentional interference, as well as determining their location. This is due to the ease of detection of the emitting transmitter of the probing signal in single-position radars. It led to the main disadvantage of single-position radars – low noise immunity and low survivability. The transition to a network of radar systems can significantly reduce the impact of deliberately directed interference. It also allows the use of methods for distributed processing of radar information in airspace surveillance systems. \u0000Analysis of the effectiveness of information support algorithms based on distributed processing of radar information of airspace surveillance systems, taking into account the final result, makes it possible to detect airborne objects using a packet of binary-quantized signals, taking into account two algorithms for combining detection results: channel accumulation and combining results; association of channel solutions and accumulation. It shows following: – the quality of consumer information support based on the proposed structure is much higher compared to the used radar information processing structure; the quality of information support for consumers has the best performance when using the signal processing method based on the accumulation of signals with the subsequent combination of detection results; the availability factor of the aircraft transponder significantly affects the quality of information support, already at P0<0.9 the use of integer logic for combining detection information is undesirable.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"59 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84271029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of threats to data security and integrity in cloud computing 概述云计算对数据安全和完整性的威胁
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.03
M.V. Yesina, A.A. Kravchenko, S.O. Kravchenko
{"title":"An overview of threats to data security and integrity in cloud computing","authors":"M.V. Yesina, A.A. Kravchenko, S.O. Kravchenko","doi":"10.30837/rt.2023.1.212.03","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.03","url":null,"abstract":"Cloud computing has become an integral part of our lives, and today it is used almost everywhere. In general, cloud computing is a concept of providing IT resources in the form of services. There are two cloud computing models: deployment models, which differ in the type of cloud management and access to the cloud and the level of security, and service models, which differ in the level of service provision, which affects, among other things, the level of responsibility of the service provider and the consumer. Cloud services began to gain popularity in 2009, and the demand for them has grown exponentially every year. They became especially popular during the pandemic in 2019, when people had to stay at home without interrupting their work processes, and now, in post-covid times, they also remain popular due to their convenience, high availability, easy scalability and cost savings. Due to the widespread use of cloud computing services, a high level of security is required. Unfortunately, the popularity of cloud computing has its drawbacks – in addition to the fact that it is more difficult to monitor the security of a remote environment than the security of a local computer, there are many other threats. In today's reality, people use cloud computing technologies in large volumes, for example, at work, for personal purposes, etc., as they have great trust in these technologies. This is the reason why it is necessary to maintain a high level of security and constantly improve it. Cloud computing security threats are usually divided into confidentiality, integrity, and availability threats. To prevent the loss of confidential information, service providers must ensure its integrity. Users want to be sure that their data will not fall into the hands of an intruder or third-party services. Therefore, this article discusses the most common threats to data security and integrity in cloud computing and the existing methods that prevent these vulnerabilities and possible problems at different levels and with the help of different tools.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"3 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83277121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ways to improve the efficiency of methods and means of counteracting unauthorized speech recording and their comparative analysis 提高反非法录音效率的方法和手段及其比较分析
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.07
A. Oleynikov, V.A. Pulavskyi, O.H. Bilotserkivets
{"title":"Ways to improve the efficiency of methods and means of counteracting unauthorized speech recording and their comparative analysis","authors":"A. Oleynikov, V.A. Pulavskyi, O.H. Bilotserkivets","doi":"10.30837/rt.2023.1.212.07","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.07","url":null,"abstract":"The features of using ultrasonic, electromagnetic and acoustic methods to counteract unauthorized recording of speech on sound recording devices are considered. The advantages and unused possibilities of the methods are noted. Ways to increase the effectiveness of the ultrasonic method of counteraction consist in using the two-frequency ultrasonic method, in positioning the device for emitting ultrasonic vibrations no more than two meters from the target, in using high-intensity ultrasonic vibrations, in using the ultrasonic method together with the acoustic method, and others. Ways to increase the effectiveness of the electromagnetic method consist in using amplitude-pulse modulation of the interference signal, narrowly directed antennas, a device with a maximum allowable power, and others; Ways to increase the effectiveness of the acoustic method consist in creating speech-like interference from the speech of the interlocutor (synchronized with speech pauses), reducing the distance between the source of interference radiation and the source of speech in relation to the distance between the interlocutors due to organizational protection measures. (adapted acoustic method). \u0000The most promising is the adapted acoustic method having the greatest potential for guaranteed countermeasures, subject to the requirements for its optimal use. \u0000Analyzing the results of the experiment, we conclude that the adapted acoustic method is the most effective. The effectiveness of the method confirms the suppression range from 1.8 m to 3.5 m depending on the device, for comparison, in the ultrasonic experiment, one of the indicators was 0.9 m, and in the electromagnetic experiment, even 0 m. The formation of interference through the acoustic channel is higher the described method ensures the universality of the proposed method to the type of device for suppressing unauthorized speech recording, regardless of the underlying method – electromagnetic, ultrasonic or acoustic.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"16 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86856084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of promising key encapsulation mechanisms in the core-SVP model 核心- svp模型中有前途的密钥封装机制的安全性分析
IF 0.3
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI: 10.30837/rt.2023.1.212.06
S.O. Kandiy
{"title":"Security analysis of promising key encapsulation mechanisms in the core-SVP model","authors":"S.O. Kandiy","doi":"10.30837/rt.2023.1.212.06","DOIUrl":"https://doi.org/10.30837/rt.2023.1.212.06","url":null,"abstract":"The study of key encapsulation mechanisms on structured lattices is one of the important directions in modern post-quantum cryptography, as many mechanisms are either already standardized (DSTU 8961:2019 \"Skelya\") or are promising candidates for standardization (CRYSTALS-Kyber). Estimating the complexity of lattice reduction for cryptographic schemes is an old problem. Asymptotic estimates differ greatly from experimental values, therefore, a number of heuristic methods were developed to solve practical problems. The coreSVP model is a standard means of assessing the security of cryptographic schemes on lattices. The purpose of the work is to analyze the encapsulation mechanisms of DSTU 8961:2019 \"Skelya\" and CRYSTALS-Kyber keys in the coreSVP model. The analysis was performed using two popular heuristics – GSA (Geometric Series Assumption) and the Chen-Nguyen simulator. The analysis showed that the Chen-Nguyen simulator gives slightly lower estimates than the GSA heuristic. As a result of the analysis, it was found that 8961:2019 The “Skelya” and CRYSTALS-Kyber in the coreSVP model for classical computers have slightly lower than declared security values, but for quantum computers the key encapsulation mechanisms provide the declared security levels. Note that during the analysis, the accuracy of the GSA heuristics and the Chen-Nguyen simulator were analyzed separately. Examples of parameters for which heuristics do not give sufficiently accurate results are given. The performed analysis does not take into account the algebraic structure of lattices used in 8961:2019 \"Skelya\" and CRYSTALS-Kyber. The inclusion of an algebraic structure in the analysis is a further direction of work. The use of simulators is a promising direction, however, more accurate simulators that take into account the structuring of LWE and NTRU arrays are needed.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"30 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91302475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信