Proposals of comparative analysis and decision making during the competition regarding the certain benefits of asymmetric post quantum cryptographic primitives
Keywords:
electronic signature mechanisms analysis, weight indices, electronic signature, electronic signature estimation criterion, electronic signature comparison analysis methods
Abstract
Considers proposals on the implementation of cryptographic primitives comparative analysis and substantiation, development and experimental confirmation of methodical bases application possibilities of system unconditional and conditional criteria selection and application, and methods and technique of comparative analysis and making the decision on asymmetric post quantum cryptographic primitives type directional encryption, and keys encapsulation and electronic signatures mechanisms. Some criteria and indicators that can be used for comparative analysis of properties of the candidates for the post quantum cryptographic primitives are presented. Comparative analysis of the existing mechanisms of perspective electronic signatures in accordance with ISO/IEC 14888-3:2016 standard and some cryptographic primitives that are considered possible to use in the post quantum period is carried out. The results of the cryptographic primitives conducted estimation are presented. Conclusions and recommendations on the use of certain cryptographic primitives estimation methods are made.Downloads
Download data is not yet available.
References
AES: the Advanced Encryption Standard [Electronic Resource]. - Way of access: https://competitions.cr.yp.to/aes.html. - Title from the screen.
Analytic hierarchy process [Electronic Resource]. - Way of access: https:// en.wikipedia.org/wiki/ Analytic_hierarchy_ process. - Title from the screen.
ETSI GR QSC 001 V.1.1.1 (2016-07). Quntum-Safe Cryptography (QSC); Quantum-safe algorithmic framework [Electronic Resource]. - Way of access: https://portal.etsi.org/webapp/workProgram/Report_WorkItem.asp?wki_id=46690. - Title from the screen.
Information technology – Security techniques – Digital signatures with appendix – Part 3: Discrete logarithm based mechanisms: ISO/IEC 14888-3 (Edition 2 (2006-11-15)): 2006. – 68 p.
Information technology – Security techniques – Digital signatures with appendix – Part 3: Discrete logarithm based mechanisms: ISO/IEC 14888-3 (Edition 3): 2016. – 130 p.
Kalyna [Electronic Resource]. - Way of access: http://www.slideshare.net/oliynykov/kalyna. - Title from the screen.
Koblitz N. A riddle wrapped in an enigma / Neal Koblitz, Alfred J. Menezes [Electronic Resource]. - Way of access: https://eprint.iacr.org/2015/1018.pdf. - Title from the screen.
Kupyna [Electronic Resource]. - Way of access: https://ru.wikipedia.org/wiki/Kupyna. - Title from the screen.
Chen L. Report on Post-Quatum Cryptography. NISTIR 8105 (DRAFT) / Lili Chen, Stephen Jordan, Yi-Kai-Liu et al. [Electronic Resource]. - Way of access: http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf. - Title from the screen.
Mosca M. Setting the Scene for the ETSI Quantum-safe Cryptography Workshop / M. Mosca // E-proceedings of “1st Quantum-Safe-Crypto Workshop”, Sophia Antipolis, Sep. 26-27, 2013 [Electronic Resource]. - Way of access: http://docbox.etsi.org/Workshop/2013/201309_CRYPTO/eproceedings_Crypto_2013.pdf. - Title from the screen.
NESSIE: New European Schemes for Signatures, Integrity, and Encryption [Electronic Resource]. - Way of access : https://competitions.cr.yp.to/nessie.html. - Title from the screen.
Post-quantum crypto project [Electronic Resource]. - Way of access: http://csrc.nist.gov/groups/ST/post-quantum-crypto/index.html. - Title from the screen.
Procedures for Determining the Weights of Selection Factors in the Weighted-Matrix Delivery Decision [Electronic Resource]. - Way of access: http://www.tcrponline.org/PDFDocuments/tcrp_rpt_131AppF.pdf. - Title from the screen.
Proposed Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process [Electronic Resource]. - Way of access: http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-for-proposals-draft-aug-2016.pdf. - Title from the screen.
Quantum Safe Cryptography and Security. An introduction, benefits, enablers and challenges // ETSI White Paper. - 2015. - No. 8 [Electronic Resource]. - Way of access: http://www.etsi.org/images/files/ETSI White Papers / Quantum Safe Whitepaper.pdf. - Title from the screen.
Roszkowska E. Rank ordering criteria weighting methods – a comparative overview / Ewa Roszkowska // Optimum. Studia ekonomiczne. - 2013. - № 5 (65). – P. 14–33 [Electronic Resource]. - Way of access: http:// repozytorium. uwb.edu.pl /jspui/bitstream/ 11320/2189/1/02_Ewa%20ROSZKOWSKA.pdf. - Title from the screen.
Saaty T. L. Decision making with the analytic hierarchy process / Thomas L. Saaty // Int. J. Services Sciences. - 2008. - Vol. 1. - №1. - P. 83 – 98 [Electronic Resource]. - Way of access: http://www.colorado.edu/geography/leyk/geog_5113/ readings/saaty_2008.pdf. - Title from the screen.
Saaty T. L. The Analytic Hierarchy Process / T. L. Saaty. - New York: McGraw Hill, 1980. – 278 p.
The methods of expert estimations [Electronic Resource]. - Way of access: http://books forstudy.com/19650323/ ekonomi-ka/metodi ekspertnih otsinok.htm. - Title from the screen.
Yesina M. Methods of cryptographic primitives comparative analysis / Maryna Yesina, Yurij Gorbenko // Inżynier XXI wieku (“Engineer of XXI Century” – the VI Inter University Conference of Students, PhD Students and Young Scientists: University of Bielsko-Biala, Poland, December 02, 2016). – Bielsko-Biała: Wydawnictwo Naukowe Akademii Techniczno-Humanistycznej w Bielsku-Białej, 2016. – P. 451–462.
Zhukova O. V. Fishburne’s method and the classical method of pharmacoeconomic analysis in the evaluation of antibiotic treatment of acute and recurrent bronchitis in children / Olga V. Zhukova, Tatjana M. Konyshkina, Svetlana V. Kononova // Int. J. Pharm. Science. – 2015. – Vol. 7. – Issue 11. – P. 185–190 [Electronic Resource]. - Way of access: http://innovareacademics.in/journals/index.php/ijpps/article/view/7770/5973. - Title from the screen.
Andreichikov A. V. Analiz, sintez, planirovanie reshenii v ekonomike / A. V. Andreichikov, O. N. Andreichikova. – Moskva: Finansy i statistika, 2002. – 359 s.
Gorbenko I. D. Postkvantova kryptografija ta mehanizmy i'i' realizacii' / I.D. Gorbenko, O.O. Kuznecov, O.V. Potij ta in. // Radiotehnika. – 2016. – Vyp. 186. – S. 32–52.
Gorbenko Ju. I. Metody pobuduvannja ta analizu kryptografichnyh system: monografija. / Ju. I. Gorbenko. – Kharkiv: Fort, 2015. – 959 s.
Orlovskii S. A. Problemy prinyatiya reshenii pri nechetkoi iskhodnoi informatsii / S. A. Orlovskii. – Moskva: Nauka, 1981. – 208 s.
Analytic hierarchy process [Electronic Resource]. - Way of access: https:// en.wikipedia.org/wiki/ Analytic_hierarchy_ process. - Title from the screen.
ETSI GR QSC 001 V.1.1.1 (2016-07). Quntum-Safe Cryptography (QSC); Quantum-safe algorithmic framework [Electronic Resource]. - Way of access: https://portal.etsi.org/webapp/workProgram/Report_WorkItem.asp?wki_id=46690. - Title from the screen.
Information technology – Security techniques – Digital signatures with appendix – Part 3: Discrete logarithm based mechanisms: ISO/IEC 14888-3 (Edition 2 (2006-11-15)): 2006. – 68 p.
Information technology – Security techniques – Digital signatures with appendix – Part 3: Discrete logarithm based mechanisms: ISO/IEC 14888-3 (Edition 3): 2016. – 130 p.
Kalyna [Electronic Resource]. - Way of access: http://www.slideshare.net/oliynykov/kalyna. - Title from the screen.
Koblitz N. A riddle wrapped in an enigma / Neal Koblitz, Alfred J. Menezes [Electronic Resource]. - Way of access: https://eprint.iacr.org/2015/1018.pdf. - Title from the screen.
Kupyna [Electronic Resource]. - Way of access: https://ru.wikipedia.org/wiki/Kupyna. - Title from the screen.
Chen L. Report on Post-Quatum Cryptography. NISTIR 8105 (DRAFT) / Lili Chen, Stephen Jordan, Yi-Kai-Liu et al. [Electronic Resource]. - Way of access: http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf. - Title from the screen.
Mosca M. Setting the Scene for the ETSI Quantum-safe Cryptography Workshop / M. Mosca // E-proceedings of “1st Quantum-Safe-Crypto Workshop”, Sophia Antipolis, Sep. 26-27, 2013 [Electronic Resource]. - Way of access: http://docbox.etsi.org/Workshop/2013/201309_CRYPTO/eproceedings_Crypto_2013.pdf. - Title from the screen.
NESSIE: New European Schemes for Signatures, Integrity, and Encryption [Electronic Resource]. - Way of access : https://competitions.cr.yp.to/nessie.html. - Title from the screen.
Post-quantum crypto project [Electronic Resource]. - Way of access: http://csrc.nist.gov/groups/ST/post-quantum-crypto/index.html. - Title from the screen.
Procedures for Determining the Weights of Selection Factors in the Weighted-Matrix Delivery Decision [Electronic Resource]. - Way of access: http://www.tcrponline.org/PDFDocuments/tcrp_rpt_131AppF.pdf. - Title from the screen.
Proposed Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process [Electronic Resource]. - Way of access: http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/call-for-proposals-draft-aug-2016.pdf. - Title from the screen.
Quantum Safe Cryptography and Security. An introduction, benefits, enablers and challenges // ETSI White Paper. - 2015. - No. 8 [Electronic Resource]. - Way of access: http://www.etsi.org/images/files/ETSI White Papers / Quantum Safe Whitepaper.pdf. - Title from the screen.
Roszkowska E. Rank ordering criteria weighting methods – a comparative overview / Ewa Roszkowska // Optimum. Studia ekonomiczne. - 2013. - № 5 (65). – P. 14–33 [Electronic Resource]. - Way of access: http:// repozytorium. uwb.edu.pl /jspui/bitstream/ 11320/2189/1/02_Ewa%20ROSZKOWSKA.pdf. - Title from the screen.
Saaty T. L. Decision making with the analytic hierarchy process / Thomas L. Saaty // Int. J. Services Sciences. - 2008. - Vol. 1. - №1. - P. 83 – 98 [Electronic Resource]. - Way of access: http://www.colorado.edu/geography/leyk/geog_5113/ readings/saaty_2008.pdf. - Title from the screen.
Saaty T. L. The Analytic Hierarchy Process / T. L. Saaty. - New York: McGraw Hill, 1980. – 278 p.
The methods of expert estimations [Electronic Resource]. - Way of access: http://books forstudy.com/19650323/ ekonomi-ka/metodi ekspertnih otsinok.htm. - Title from the screen.
Yesina M. Methods of cryptographic primitives comparative analysis / Maryna Yesina, Yurij Gorbenko // Inżynier XXI wieku (“Engineer of XXI Century” – the VI Inter University Conference of Students, PhD Students and Young Scientists: University of Bielsko-Biala, Poland, December 02, 2016). – Bielsko-Biała: Wydawnictwo Naukowe Akademii Techniczno-Humanistycznej w Bielsku-Białej, 2016. – P. 451–462.
Zhukova O. V. Fishburne’s method and the classical method of pharmacoeconomic analysis in the evaluation of antibiotic treatment of acute and recurrent bronchitis in children / Olga V. Zhukova, Tatjana M. Konyshkina, Svetlana V. Kononova // Int. J. Pharm. Science. – 2015. – Vol. 7. – Issue 11. – P. 185–190 [Electronic Resource]. - Way of access: http://innovareacademics.in/journals/index.php/ijpps/article/view/7770/5973. - Title from the screen.
Andreichikov A. V. Analiz, sintez, planirovanie reshenii v ekonomike / A. V. Andreichikov, O. N. Andreichikova. – Moskva: Finansy i statistika, 2002. – 359 s.
Gorbenko I. D. Postkvantova kryptografija ta mehanizmy i'i' realizacii' / I.D. Gorbenko, O.O. Kuznecov, O.V. Potij ta in. // Radiotehnika. – 2016. – Vyp. 186. – S. 32–52.
Gorbenko Ju. I. Metody pobuduvannja ta analizu kryptografichnyh system: monografija. / Ju. I. Gorbenko. – Kharkiv: Fort, 2015. – 959 s.
Orlovskii S. A. Problemy prinyatiya reshenii pri nechetkoi iskhodnoi informatsii / S. A. Orlovskii. – Moskva: Nauka, 1981. – 208 s.
Published
2017-04-24
Cited
How to Cite
Горбенко, І., Горбенко, Ю., Єсіна, М., & Пономар, В. (2017). Proposals of comparative analysis and decision making during the competition regarding the certain benefits of asymmetric post quantum cryptographic primitives. Computer Science and Cybersecurity, (1), 53-70. Retrieved from https://periodicals.karazin.ua/cscs/article/view/8307
Issue
Section
Статті