RESEARCH OF USAGE POSSIBILITY AND POST-QUANTUM ALGORITHMS ADVANTAGES DEPEND ON APPLICATION CONDITIONS

Abstract

We established the need for comparative analysis and evaluation of the possibility to use asymmetric post-quantum cryptographic mechanisms. In order to compare, a procedure for evaluation was selected based on integral assessments of unconditional and conditional criteria. An analysis was conducted among the algorithms that fulfilled general unconditional criteria. As conditional criteria, we chose numerical characteristics of algorithms. In addition, additional unconditional criteria were put forward that differed depending on the conditions of use. The relevance of present research is associated with the emergence of a quantum computer. Previous studies have already proved that the existing cryptographic algorithms are vulnerable to the methods of quantum cryptanalysis. That is why, at present, leading organizations in the standardization of crypto algorithms conduct research and comparisons for selecting the post-quantum standard of cryptography. As a result of present research, we found a lack of a universal post-quantum cryptographic algorithm. It is proposed to separate three variants in the application of post-quantum algorithms: for lightweight cryptography, for the use by standard automated systems and use in a cloud-based environment. For all conditions of use, a separate evaluation of benefits in the cryptographic algorithms was carried out. Deficiencies in the leading candidate were detected. That is why the recommendations were given to employ these algorithms as the basic ones in the transition period. And, if the suspicion is confirmed, then we proposed alternatives. Results of present research allow us to understand current state in the development of post-quantum crypto algorithms and to predict their possible further development. The practical value of the research consists in obtaining the evaluation for post-quantum algorithms, depending on the conditions of their application.

Authors and Affiliations

Ivan Gorbenko, Vladimir Ponomar, Maryna Yesina

Keywords

Related Articles

PERIODIC CHARACTERISTICS OF OUTPUT FEEDBACK ENCRYPTION MODE

We investigate periodic characteristics of sequence of output blocks in the output feedback encryption mode. The model of random homogeneous substitution is used for an abstract description of this formation. This proper...

ESTIMATE OF NOISE-IMMUNITY FOR INDIVISIBLE CODES

Considered the problem of finding general criteria to assess the effectiveness of indivisible codes

ДЕФІНІЦІЙНІ ПРОБЛЕМИ ТЕРМІНОЛОГІЇ У СФЕРІ КІБЕРБЕЗПЕКИ І КІБЕРОБОРОНИ ТА ШЛЯХИ ЇХ ВИРІШЕННЯ

На підставі аналізу термінології сфери кібербезпеки та кібероборони, національних інтересів України в кіберпросторі та з урахуванням досвіду провідних країн світу, у статті розглянуті концептуальні підходи щодо врегулюва...

Methods and results of electronic signatures with appendix and message recovery comparative analysis

The paper deals with the comparative analysis methods of electronic signature mechanisms properties. The existing methods of comparative analysis of electronic signatures based on expert estimations methods – analytic hi...

ПОБУДОВА СИСТЕМИ ГОЛОСУВАННЯ З ВИКОРИСТАННЯМ БЛОКЧЕЙН ТЕХНОЛОГІЙ НА ПРИКЛАДІ HYPERLEDGER

Обговорюється характеристики і особливості роботи в системі Hyperledger Fabric та характерні проблеми реалізації транзакцій. Проведено розгляд регістрів і принципів їх роботи в відповідних системах, зокрема підключення...

Download PDF file
  • EP ID EP263903
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Ivan Gorbenko, Vladimir Ponomar, Maryna Yesina (2017). RESEARCH OF USAGE POSSIBILITY AND POST-QUANTUM ALGORITHMS ADVANTAGES DEPEND ON APPLICATION CONDITIONS. КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА, 3(7), 45-66. https://europub.co.uk/articles/-A-263903