CASPIAN JOURNAL
MANAGEMENT AND HIGH TECHNOLOGIES
RESEARCH OF KEY ENCAPSULATION MECHANISMS BASED ON POSTQUANTUM CRYPTOGRAPHIC ALGORITHMS
Read | Vlasenko Alexandra V., Evsyukov Michael V., Putyato Michael M., Makaryan Alexander S. RESEARCH OF KEY ENCAPSULATION MECHANISMS BASED ON POSTQUANTUM CRYPTOGRAPHIC ALGORITHMS // Caspian journal : management and high technologies. — 2019. — №4. — pp. 121-127. |
Vlasenko Alexandra V. - Cand. Sci. (Engineering), Associate Professor, Head of the Department of Computer Technologies and Information Security of the Institute of Information Technology and Security, Kuban State Technological University, 2 Moskovskaya St., Krasnodar, 350072, Russian Federation, Vlasenko@kubstu.ru
Evsyukov Michael V. - student, Kuban State Technological University, 2 Moskovskaya St., Krasnodar, 350072, Russian Federation, michael.evsyukov@gmail.com
Putyato Michael M. - Cand. Sci. (Engineering), Associate Professor, Kuban State Technological University, 2 Moskovskaya St., Krasnodar, 350072, Russian Federation, putyato.m@gmail.com
Makaryan Alexander S. - Cand. Sci. (Engineering), Associate Professor, Kuban State Technological University, 2 Moskovskaya St., Krasnodar, 350072, Russian Federation, msanya@yandex.ru
Rapid progress in the study and construction of quantum computers leads to the need of quick replacement of the current asymmetric cryptography algorithms with those that are capable of providing resistance to quantum cryptanalysis. Since their implementation is certain to take a long time, the approval of post-quantum standards becomes an urgent issue. However, the task of choosing algorithms to serve as standards is significantly complicated by heterogeneity of the mathematical nature of post-quantum cryptosystems. A comparison of two algorithms by different criteria can often lead to opposing evaluation results. In this regard, the article proposes a unified system of criteria for evaluating the post-quantum key encapsulation mechanisms. Its purpose is to bring each cryptosystem’s properties related to security, performance and flexibility to a form that allows an objective comparison of algorithms. The specified system of criteria was used to analyze candidate algorithms for the role of the post-quantum key encapsulation mechanism standard that have passed to the second round of the NIST contest. During the analysis, it was possible not only to identify the algorithms, the use of which, at the moment, seems to be the most preferable, but also to formulate some recommendations aimed at improving the efficiency of further analysis of the algorithms. In particular, sets of algorithms that may be appropriate to combine into one were listed. In addition, based on the analysis, the nature of the mutual dependencies between the groups of criteria for evaluating the algorithms is revealed. The set of criteria used and the approach to comparing key encapsulation methods can be easily adapted for a similar analysis of candidates for the role of a post-quantum standard for digital signature or encryption algorithm.
Key words: квантовый компьютер, шифрование, защита информации, асимметричная криптография, криптоанализ, анализ, кибербезопасность, гибридные криптосистемы, quantum computer, encryption, information security, asymmetric quantum-resistant cryptography, cryptoanalysis