State of development, research and standardization of cryptographic transformations such as asymmetric encryption and post-quantum key encapsulation protocol

Fìz.-mat. model. ìnf. tehnol. 2021, 32:181-185

  • Vladyslav Kulibaba V. N. Karazin Kharkiv National University
  • Vsevolod Bobukh JSC "Institute of Information Technologies", st. Bakulina, 12, 61166, Kharkiv
Keywords: asymmetric encryption, postquantum period, attacks by third-party channels, key encapsulation protocol, algebraic lattices, cryptographic stability, national standard

Abstract

The paper presents the state of development of cryptocurrencies such as ACS and PIC at the international and national levels. The state of standardization of cryptocurrencies of ASS and PIK at the international competition NIST of the USA, the requirements put forward to candidates on 2 and 3 rounds of competition are considered. The state of standardization of crypto transformations of this type at the national level in Ukraine is considered, and a brief description of the national standard ASSH DSTU 8961: 2019, based on algebraic lattices, is given. The methodology and results of achieving the national standard DSTU 8961:2019 against attacks by third-party channels in terms of the dependence of the time of direct and reverse transformation (encapsulation and decapsulation of the key) on the number of units in the private key.

References
  1. Post-Quantum Cryptography – Project Overview (2016). Electronic resource. Access mode: https://csrc.nist.gov/projects/post-quantum-cryptography.
  2. Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Miller, C. ... Liu, Yi. (2019). Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process. NISTIR 8240. Electronic resource. Access mode: https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8240.pdf.
    DOI doi.org/10.6028/nist.ir.8240
  3. Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Miller, C. ... Liu, Yi. (2020). Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. NISTIR 8309. Electronic resource. Access mode: https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf.
    DOI doi.org/10.6028/nist.ir.8309
  4. National Institute of Standards and Technology. Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. Electronic resource. Access mode: https://csrc.nist.gov/CSRC/media/Projects/Post-QuantumCryptography/documents/call-for-proposals-final-dec-2016.pdf.
  5. Gorbenko, I. D., Kachko, О. G, Alekseychuk, А. N., Kuznetsov, О. О., Gorbenko, Yu. І., Onoprienko, V. V. ... Candiy, S.O. (2019). Algorithms of asymmetric encryptation and encapsulation of keys of post-quantum period of 5-7 levels of stability and their applications. Radiotekhnika. Kharkov : KNURE, 198, 5-18. DOI:10.30837/rt.2019.3.198.01.
    DOI doi.org/10.30837/rt.2019.3.198.01
  6. Gorbenko, I. D., Kachko, O. G., Esina, M. V. (2018). General statements and analysis of the end-to-end encryption algorithm NTRU Prime IIT Ukraine. Radiotekhnika. Kharkov : KNURE, 5-16.
    DOI doi.org/10.1615/telecomradeng.v77.i9.50
  7. Gorbenko, I. D., Alekseychuk, A. N., Kachko, O. G., Yesina, M. V., Stelnik, I. V., Kandy, S.O., ... Ponomar, V.A. (2019). Calculation of general parameters for NTRU Prime Ukraine of 6-7 levels of stability // Telecommunications and Radio Engineering, 78(4), 327-340. DOI: 10.1615/TelecomRadEng.v78.i4.40.
    DOI doi.org/10.1615/telecomradeng.v78.i4.40
  8. Gorbenko, I. D., Kachko, O. G., Gorbenko, Yu. I., Stelnik, I.V., Kandyi, S.O., Yesina, M.V. (2019). Methods of building general parameters and keys for NTRU Prime Ukraine of 5th–7th levels of stability. Product form. Telecommunications and Radio Engineering, 78(7), 579-594. DOI: 10.1615/TelecomRadEng.v78.i7.30.98.
    DOI doi.org/10.1615/telecomradeng.v78.i7.30
  9. Kachko, O. G, Gorbenko, Yu. I., Yesina, M. V, Akolzina, O. (2017). Asymmetric encryption algorithm optimization based on using NTRU Prime mathematics. Radiotekhnika, 191, 5-10.
    DOI doi.org/10.1615/telecomradeng.v77.i9.50
  10. DSTU 8961:2019 Information Technology. Cryptographic information protection. Asymmetric encryption and key encapsulation algorithms.
  11. DSTU 7564:2014 Information Technology. Cryptographic information protection. Hashing function.
  12. DSTU 8845:2019 Information Technology. Cryptographic information protection. Symmetric flow transformation algorithm.
Published
2021-07-08
How to Cite
Kulibaba, V., & Bobukh, V. (2021). State of development, research and standardization of cryptographic transformations such as asymmetric encryption and post-quantum key encapsulation protocol. PHYSICO-MATHEMATICAL MODELLING AND INFORMATIONAL TECHNOLOGIES, (32), 181-185. https://doi.org/10.15407/fmmit2021.32.181