TRANSITION TO POST-QUANTUM CRYPTOGRAPHY: CHALLENGES, STANDARDIZATION, AND PROSPECTS.
DOI:
https://doi.org/10.18372/2225-5036.30.19243Keywords:
Post-quantum cryptography, quantum computers, standardization process, NIST, post-quantum cryptographic systemsAbstract
This article provides a detailed analysis of the problems and prospects of the implementation of post-quantum cryptographic algorithms, which are becoming more and more relevant in connection with the development of quantum computing. The main challenges related to the standardization of post-quantum algorithms are considered, in particular the issues of flexibility of algorithms, their performance, complexity of implementation and uncertainty regarding the appearance of quantum computers capable of breaking modern cryptosystems. Particular attention is paid to the assessment of the current state of development of post-quantum cryptographic standards, as well as to the analysis of potential scenarios of the transition to new information protection systems. The main role here is played by the US National Institute of Standards and Technology (NIST). NIST provides key coordination and leadership in the development of post-quantum cryptography standards, initiating an open competition process to identify the most promising cryptographic algorithms. The program launched by NIST involves a multi-year process of evaluating, testing and selecting algorithms capable of providing resistance to attacks by quantum computers. Within this program, a wide range of algorithms were considered, which differ in encryption approaches, performance and degree of security. On the basis of the conducted research, recommendations are proposed for the effective management of the transition period from traditional cryptographic systems to post-quantum solutions, which should ensure reliable data security in the face of new technological challenges. In particular, approaches to managing the transition period, risk reduction strategies, as well as assessment of possible threats and ways to minimize them are offered. As a result, the article provides a valuable basis for the formation of a strategy for the safe adaptation of information systems in the age of quantum technologies.
References
L.K. Grover. (1996). A fast quantum mechanical algorithm for database search. Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
S. Yevseiev, O. Tsyhanenko, A. Gavrilova, V. Guzhva, O. Milov, V. Moskalenko, I. Opirskyy, O. Roma, B. Tomashevsky, O. Shmatko. (2019). Development of niederreiter hybrid crypto-code structure on flawed codes. Eastern-european journal of enterprise technologies. Information and controlling system 1, 9 (97), pp. 27-38. https://doi.org/10.15587/1729-4061.2019.156620
A. Sahun, V. Khaidurov, V. Lakhno, I. Opirskyy, V. Chubaievskyi, O. Kryvoruchko., A. Desiatko. (2021). Devising a method for improving crypto resistance of the symmetric block cryptosystem RC5 using nonlinear shift functions. Eastern-European Journal of Enterprise Technologies, 5 (113), pp. 17–29. https://doi.org/10.15587/1729-4061.2021.240344
I. Opirskyy, Y. Sovyn and O. Mykhailova. (2022). Heuristic Method of Finding Bitsliced-description of Derivative Cryptographic S-box," 2022 IEEE 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), pp. 104-109. https://doi.org/10.1109/TCSET55632.2022.9766883
D.J. Bernstein, J. Buchmann, E. Dahmen. (2016). Code-based cryptography.
D.J. Bernstein. (2019). Visualizing size-security tradeoffs for lattice-based encryption. IACR Cryptol. ePrint Arch. pp. 655.
A. Casanova, J.C. Faugere, G. Macario-Rat, J. Patarin, L. Perret, J. Ryckeghem. (2017). A great multivariate short signature. Submission to NIST
R.A. Grimes. (2020). Cryptography Apocalypse
L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. Perlner, D. Smith-Tone. (2016). Report on Post-Quantum Cryptography. NIST Publications. http://dx.doi.org/10.6028/NIST.IR.8105
G. Alagic, J. Alperin-Sheriff, D. Apon, D. Cooper, Q. Dang, J. Kelsey, Y.-K. Liu, C. Miller, D. Moody, R. Peralta, R. Perlner, A. Robinson, D. Smith-Tone. (2020). Status report on the second round of the NIST post-quantum cryptography standardization process. NIST Publications. https://doi.org/10.6028/NIST.IR.8309
G. Alagic, D. Apon, D. Cooper, Q. Dang, T. Dang, J. Kelsey, J. Lichtinger, C. Miller, D. Moody, R. Peralta, R. Perlne, A. Robinson, D. Smith-Tone, Y.-K. Liu. (2022). Status report on the third round of the NIST post-quantum cryptography standardization process. NIST Publications. https://doi.org/10.6028/NIST.IR.8413
M. Kumar. (2022). Post-quantum cryptography Algorithm's standardization and performance analysis. Array, Volume 15, Article 100242. https://doi.org/10.1016/j.array.2022.100242
M. Baldi, P. Santini, G. Cancellieri. (2017). Post-quantum cryptography based on codes: state of the art and open challenges. AEIT International Annual Conference. https://doi.org/10.23919/aeit.2017.8240549.
P. Wallden, E. Kashefi. (2021). Cyber security in the quantum Era.
D. Bellizia, N. Mrabet, A. P. Fournaris, S. Pontié, F. Regazzoni; F.-X. Standaert, É. Tasso. (2021). Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design. IEEE International Symposium on Defect and fault tolerance in VLSI and Nanotechnology systems (DFT), pp. 1-6. https://doi.org/10.1109/DFT52944.2021.9568301
R. Asif. (2021). Post-quantum cryptosystems for internet-of-Things: a Survey on lattice-based algorithms. IoT, 2 (1), pp. 71-91. https://doi.org/10.3390/iot2010005
W. Buchanan, A. Woodward. (2016). Will quantum computers Be the end of public key encryption? Journal of Cyber Security Technology, 1 (1), pp. 1-22. https://doi.org/10.1080/23742917.2016.1226650
L. Chen. (2017). Cryptography standards in quantum time: new wine in an Old Wineskin? IEEE Security & Privacy 15 (4), pp. 51-57. https://doi.org/10.1109/MSP.2017.3151339
C. Bernhardt. (2019). Quantum Computing for Everyone. Cambridge, MA: MIT Press
P. Hauke, H.G. Katzgraber, W. Lechner, H. Nishimori, W.D. Oliver. (2020). Perspectives of quantum annealing: Methods and implementations. Reports on Progress in Physics 83 (5), Article 054401.
A. Maitra, J. Samuel, S. Sinha. (2019). Likelihood Theory in a Quantum World: Tests with Quantum coins and computers. Pramana - J Phys 94, 57. https://doi.org/10.1007/s12043-020-1926-9
M. Raavi1, S. Wuthier1, P. Chandramouli, Y. Balytskyi, X. Zhou1, and S.-Y. Chang1. (2021). Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms. ACNS 2021: Applied Cryptography and Network Security, pp. 424-447. https://doi.org/10.1007/978-3-030-78375-4_17
U. Banerjee, S. Das, A.P. Chandrakasan. (2020). Accelerating post-quantum cryptography using an Energy-efficient TLS Crypto-Processor. 2020 IEEE International Symposium on Circuits and Systems. https://doi.org/10.1109/iscas45731.2020.9180550
W. Barker, W. Polk, M. Souppaya. (2021). Getting ready for post-quantum cryptography: Exploring challenges associated with adopting and using post-quantum cryptographic algorithms. NIST Cybersecurity White Paper. https://doi.org/10.6028/NIST.CSWP.04282021
F. Borges, P.R. Reis, D. Pereira. (2020). A Comparison of security and its performance for key Agreements in post-quantum cryptography. IEEE Access, 8, pp. 142413-142422. https://doi.org/10.1109/access.2020.3013250
V. Pastushenko, D. Kronberg. (2023). Improving the Performance of Quantum Cryptography by Using the Encryption of the Error Correction Data. Entropy 25, Article 956. https://doi.org/10.3390/e25060956
C. Portmann, R. Renner. (2022). Security in quantum cryptography. Rev.Mod.Phys 94, Article 025008. https://doi.org/10.1103/RevModPhys.94.025008