SSL/TLS PROTOCOL ON POST-QUANTUM ALGORITHMS

Authors

DOI:

https://doi.org/10.18372/2225-5036.30.18616

Keywords:

SSL/TLS protocol, crypto-code constructions, UMAC algorithm, algebraic geometric codes, lossy codes

Abstract

The development of mobile technologies and their integration with Internet of Things and smart technologies form both cyber-physical and socio-cyber-physical systems. In such systems, as a rule, wireless communication channels are used, in which SSL/TLS protocols are used to provide security services (confidentiality, integrity and authenticity). However, this protocol is not only vulnerable to "Meeting in the Middle", POODLE, BEAST, CRIME, BREACH attacks, but with the advent of a full-scale quantum computer, it can be broken. The article proposes a protocol based on quantum algorithms – crypto-code constructions, which will ensure not only resistance to current attacks, but also stability in the post-quantum period. To ensure the "hybridity" of services, it is proposed to use McEliece and Niederreiter crypto-code constructions and the improved UMAC algorithm based on McEliece crypto-code design. The use of crypto-code constructions provides not only resistance to attacks, but also simplifies the formation of a connection – the parameters of elliptic curves are used for the transmission of the common key. This approach significantly reduces the time of connecting mobile gadgets and simplifies the procedure of agreement before data transfer.

References

Arora, J., K R, R., R, S., Ghantasala, G.S.P. Se-curing web documents by using piggybacked framework based on Newton's forward interpolation method (2023) Journal of Information Security and Applications, URL: https:// www.scopus.com/inward/record.uri?eid=2-s2.0-851532-77373&doi=10.1016%2fj.jisa.2023.103498&partnerID=40& md=02f8677ebd2fb80a4ff29ac6d01c50ec. DOI: 10.1016/j.ji-sa.2023.103498.

Modeling of security systems for critical infra-structure facilities: monograph / S. Yevseiev, R. Hryshch¬uk, K. Molodetska, M. Nazarkevych and others. Kharkiv: PC TECHNOLOGY CENTER, 2022. 196 p.

Saribas, S., Tonyali, S. Performance Evaluation of TLS 1.3 Handshake on Resource-Constrained Devices Using NIST's Third Round Post-Quantum Key Enca-psulation Mechanisms and Digital Signatures (2022) Proceedings - 7th International Conference on Computer Science and Engineering, UBMK 2022, pp. 294-299. URL: https:// www.scopus.com/inward/record.uri?eid=2-s2.0-85141847461&doi=10.1109%2fUBMK55850.2022.9919545&partnerID=40.

Khan, N.A., Khan, A.S., Kar, H.A., Ahmad, Z., Tarmizi, S., Julaihi, A.A. Employing Public Key Infrastru-cture to Encapsulate Messages during Transport Layer Security Handshake Procedure (2022) Proceedings - AiIC 2022: 2022 Applied Informatics International Conference: Digital Innovation in Applied Informatics during the Pandemic, pp. 126-130. URL: https://www.scopus.com/ inward / record.uri?eid = 2-s2.0-85141365676&doi=10.1109 %2fAiIC54368.2022.9914605&partnerID=40.

Ramraj, S., Usha, G. Signature identification and user activity analysis on WhatsApp Web through net-work data (2023) Microprocessors and Microsystems, 97, URL: https://www.scopus.com/inward/record.uri?eid=2-s2.0-5146098976&doi=10.1016%2fj.micpro.2023.104756&partnerID=40&md5.

Edited by Serhii Yevseiev, Volodymir Ponoma-renko, Oleksandr Laptiev, Oleksandr Milov. Synergy of building cybersecurity systems: monograph / S. Yevsei-ev, V. Ponomarenko, O. Laptiev, O. Milov and others. Kharkiv: PC TECHNOLOGY CENTER, 2021. 188 p.

Gavrilova A. Development of a modified UMAC Algorithm based on crypto-code constructions / A. Gav-ri¬lova, I. Volkov, Yu. Kozhedub, R. Korolev, O. Lezik, V. Me¬dvediev, O. Milov, B. Tomashevsky, A. Trystan, O. Chekunova // Eastern-European Journal of Enterprise Technologies. 2020. № 4/9 (106). С. 45-63.

19. Guide for Cybersecurity Event Recovery, 2022. URL: https: // nvlpubs.nist.gov / nistpubs /.../ NIST.SP. 800-184.pdf.

Security requirements for cryptographic mod-ules, 2020, URL: https://csrc.nist. gov/publications/fips/fips 140-2/fips1402. pdf.

Guide to LTE Security, 2020, URL: https:// csrc.nist.gov / publications / drafts / 800-187 /sp800_187_ draft.pdf.

Report on Post-Quantum Cryptography, 2022, URL: https: // csrc.nist.gov / publications/detail/nistir/ 8105/final.

Daniel J. Bernstein Johannes Buchmann Erik Dahmen. Post-Quantum Cryptography, 2020, URL: https://www.researchgate.net /profile/Nicolas_Sendrier / publication / 226115302_Code -Based _ Cryptography/ links/ 540d62d50cf2df04e7549388 / Code-Based-Cryptography.pdf.

Downloads

Published

2024-05-15