PROPOSALS OF COMPARATIVE ANALYSIS AND DECISION MAKING DURING THE COMPETITION REGARDING THE CERTAIN BENEFITS OF ASYMMETRIC POST QUANTUM CRYPTOGRAPHIC PRIMITIVES
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2017, Vol 1, Issue 5
Abstract
The paper considers proposals on the implementation of cryptographic primitives comparative analysis and substantiation, development and experimental confirmation of methodical bases application possibilities of system unconditional and conditional criteria selection and application, and methods and technique of comparative analysis and making the decision on asymmetric post quantum cryptographic primitives type directional encryption, and keys encapsulation and electronic signatures mechanisms. Some criteria and indicators that can be used for comparative analysis of properties of the candidates for the post quantum cryptographic primitives are presented. Comparative analysis of the existing mechanisms of perspective electronic signatures in accordance with ISO/IEC 14888-3:2016 standard and some cryptographic primitives that are considered possible to use in the post quantum period is carried out. The results of the cryptographic primitives conducted estimation are presented. Conclusions and recommendations on the use of certain cryptographic primitives estimation methods are made.
Authors and Affiliations
Ivan Gorbenko, Yurii Gorbenko, Marina Yesina, Vladimir Ponomar
Mathematical model and methods of processing biometric images of fingerprints
Today, using of personal identification technologies based on biometric parameters for access to information resources is becoming topical in connection with the increase of informatization in modern society. Physical ch...
METHOD OF TABULAR REALIZATION OF ARITHMETIC OPERATIONS IN THE SYSTEM OF RESIDUAL CLASSES
In this article the method of increase of productivity and reliability of functioning of the data processing system is suggested based on the use of position-independent computing system in the residual classes (SRC). Th...
The method of a data control in the residual system classes based on use of positional attribute of non-positional code structure
The method of a data control in the residue number system (RNS) are developed in the article, which is based on the use of positional attribute of non-positional code structure. The using variants of the proposed method...
IMPROVED MATHEMATICAL MODEL OF THE POST-QUANTUM ELETRONIC SIGNATURE MECHANISM
In the paper new electronic signature mechanisms which will be urgent in the post-quantum period devel-opment necessity is grounded. The main one time key mechanisms are briefly described. Problems related with Lamport O...
NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis
The paper deals with the modern cryptographic transformations of the asymmetric end-to-end encryption type, namely – NTRU-like cryptographic systems. A new cryptographic system NTRU Prime IIT Ukraine was created based on...