Моделі безпеки постквантових криптографічних примітивів

In this paper, the essence is considered and security models of asymmetric post-quantum cryptographic primitives of different types are investigated. The basis taken security models that are recommended by NIST USA in the requirements of the PQC competition for candidates for post-quantum cryptograp...

Full description

Saved in:
Bibliographic Details
Date:2019
Main Author: Єсіна, Марина Вітавліївна
Format: Article
Language:Ukrainian
Published: Kamianets-Podilskyi National Ivan Ohiienko University 2019
Online Access:http://mcm-tech.kpnu.edu.ua/article/view/173704
Tags: Add Tag
No Tags, Be the first to tag this record!
Journal Title:Mathematical and computer modelling. Series: Technical sciences

Institution

Mathematical and computer modelling. Series: Technical sciences
Description
Summary:In this paper, the essence is considered and security models of asymmetric post-quantum cryptographic primitives of different types are investigated. The basis taken security models that are recommended by NIST USA in the requirements of the PQC competition for candidates for post-quantum cryptographic primitives. Such algorithms include asymmetric cryptographic transformations such as asymmetric encryption, digital signature, and key encapsulation mechanism. The following security models are recommended, which are related to: the asymmetric encryption — IND-CCA2 (IND-CPA, IND-CCA); the digital signature — EUF-CMA (and its variations); the key encapsulation mechanisms — СK-model. In this paper, the basic essence of such security models is considered. The use of security models in research of cryptographic primitives is relatively new. A generalization of each of these models and a definition of the necessity and conditions, and the consequences of their application are required. Such models take into account the application environment in which an unauthenticated-links adversarial model and authenticated-links adversarial model can operate. The paper considers the concept of indistinguishability and security model of post-quantum asymmetric ciphers on its basis. The property of indistinguishability under chosen plaintext attack is determined. The concept of semantic security is considered. The types of most common attacks based on indistinguishability are given. Existing versions of the EUF-CMA security model — SUF-CMA, etc. are considered. Definitions of «forward security, forward secrecy» and «perfect forward secrecy (PFS)» are given. In addition, the paper considers the peculiarities of the application regarding to perspective asymmetric transformations of the «game theory». The definition of concept «game theory» is given