REALIZATION OF THE MECHANISM OF CONTROL SOFTWARE INTEGRITY IN POST QUANTUM PERIOD

Journal Title: Радиотехника - Year 2018, Vol 2, Issue 193

Abstract

Digital signature is important primitive of modern cryptography. Most security protocol such as SSH, TLS, SSL are using digital signature for verify the integrity and authenticity of the information. The resistance of the cryptographic algorithms with the public key is based on the computational complexity of the problems of factorization of large integers, discrete logarithms and transformation of the points on the elliptic curve. The known algorithms are RSA, DSA, and ECDSA (Table 1) [1]. Investigations in the sphere of quantum calculations form up new challenges in the given sector of the cryptography. With using of the quantum computer and the Shor algorithm the known at present crypto algorithms with the public key would be compromise. Today, regional organizations such as NIST and ETSI are already research in this field. The workgroups of ETSI and NIST determined the promising trends, within the framework of which there could be obtained acceptable solutions – the supersingular elliptic curves, the multi-variative cryptography, the cryptography on the basis of the noise immunity encoding, and the cryptography based on the hash functions. Recently, NIST open a competition for the standardization of the digital signature algorithm in the post quantum stage. This publication focuses on algorithms based on the use a hash function. Their main advantage is that they rely on simple assumptions on hash functions, such as collision or secondpreimage resistance, instead of a specific algebraic structure. In particular, if the attack is detect in a hash function, one can replace it by another function without modifying the overall structure of the scheme. Most hash-based schemes also come with relatively simple proofs of security reductions to the hash function’s properties. Their main drawback is signature size, which typically grows with the number of messages signed by a key pair [2-5]. A significant part of the research is focused on increasing of their efficiency. Besides, the simplest hash-based schemes are stateful, which means that a signer must maintain a state that is modify every time a signature is issued. This requirement can be a burden because trivial forgeries become possible if it is violated once, e.g. if two signatures are issued in the same state. Stateful schemes must therefore guarantee that this kind of misuse will not happen, which can be non-trivial for practical systems. In theory, somebody can rolling back the state of a machine after a crash, cloning virtual machines, or maintaining a pool of signing machines working in parallel. Hence, it is advisable to use a stateless scheme GRAVITY [6].

Authors and Affiliations

A. V. POTII, A. S. КАRPENKO

Keywords

Related Articles

Семантическая технология в обзорных РЛС при обнаружении и распознавании летательных аппаратов

Рассматривается семантическая технология в обзорных РЛС при обнаружении и распознавании малозаметного и малоподвижного воздушного объекта. Эта технология основывается на методах искусственного интеллекта, в основе которо...

Метод оцінки зрілості системи управління безпекою при організації повітряного руху

Питання забезпечення захисту інфраструктури системи організації повітряного руху провайдера аеронавігаційного обслуговування здійснюється шляхом забезпечення безпеки інформаційнотелекомунікаційних систем, фізичної безпек...

Дослідження k-вимірності булевої функції шифру LILI-128

Представлено результати експериментального дослідження k-вимірності булевої функції шифру LILI-128, що продемонстрували потенційну можливість реалізації статистичної атаки, яка базується на наближенні булевих функцій алг...

Топологическая идентификация оптических систем

Цель работы – создание топологической модели поиска и идентификации скрытых оптических систем наблюдения. Модель основана на фрактальных представлениях о структуре оптического сигнала и определении фрактальной размерност...

REALIZATION OF THE MECHANISM OF CONTROL SOFTWARE INTEGRITY IN POST QUANTUM PERIOD

Digital signature is important primitive of modern cryptography. Most security protocol such as SSH, TLS, SSL are using digital signature for verify the integrity and authenticity of the information. The resistance of th...

Download PDF file
  • EP ID EP587102
  • DOI -
  • Views 176
  • Downloads 0

How To Cite

A. V. POTII, A. S. КАRPENKO (2018). REALIZATION OF THE MECHANISM OF CONTROL SOFTWARE INTEGRITY IN POST QUANTUM PERIOD. Радиотехника, 2(193), 186-191. https://europub.co.uk/articles/-A-587102