Моделі безпеки постквантових криптографічних примітивів

In this paper, the essence is considered and security models of asymmetric post-quantum cryptographic primitives of different types are investigated. The basis taken security models that are recommended by NIST USA in the requirements of the PQC competition for candidates for post-quantum cryptograp...

Повний опис

Збережено в:
Бібліографічні деталі
Видавець:Kamianets-Podilskyi National Ivan Ohiienko University
Дата:2019
Автор: Єсіна, Марина Вітавліївна
Формат: Стаття
Мова:Ukrainian
Опубліковано: Kamianets-Podilskyi National Ivan Ohiienko University 2019
Онлайн доступ:http://mcm-tech.kpnu.edu.ua/article/view/173704
Теги: Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!

Репозиторії

Mathematical and computer modelling. Series: Technical sciences
Опис
Резюме:In this paper, the essence is considered and security models of asymmetric post-quantum cryptographic primitives of different types are investigated. The basis taken security models that are recommended by NIST USA in the requirements of the PQC competition for candidates for post-quantum cryptographic primitives. Such algorithms include asymmetric cryptographic transformations such as asymmetric encryption, digital signature, and key encapsulation mechanism. The following security models are recommended, which are related to: the asymmetric encryption — IND-CCA2 (IND-CPA, IND-CCA); the digital signature — EUF-CMA (and its variations); the key encapsulation mechanisms — СK-model. In this paper, the basic essence of such security models is considered. The use of security models in research of cryptographic primitives is relatively new. A generalization of each of these models and a definition of the necessity and conditions, and the consequences of their application are required. Such models take into account the application environment in which an unauthenticated-links adversarial model and authenticated-links adversarial model can operate. The paper considers the concept of indistinguishability and security model of post-quantum asymmetric ciphers on its basis. The property of indistinguishability under chosen plaintext attack is determined. The concept of semantic security is considered. The types of most common attacks based on indistinguishability are given. Existing versions of the EUF-CMA security model — SUF-CMA, etc. are considered. Definitions of «forward security, forward secrecy» and «perfect forward secrecy (PFS)» are given. In addition, the paper considers the peculiarities of the application regarding to perspective asymmetric transformations of the «game theory». The definition of concept «game theory» is given