2,096 Hits in 3.6 sec

Development of digital signature algorithm based on the Niederriter crypto-code system

О.С. Циганенко
2020 Системи обробки інформації  
The article analyzes the main requirements for resistance to post-quantum cryptography algorithms.  ...  The advent of a full-scale quantum computer based on the Shore and Grover algorithms greatly increases the capabilities of cybercriminals and reduces the resilience of cryptosystems used in protocols for  ...  Fig. 1 . 1 General classification of crypto-code constructions Fig. 2 . 2 An exchange protocol in an asymmetric cryptosystem based on the McEliece CCC wherewhere G -generator matrix of dimension k×  ... 
doi:10.30748/soi.2020.162.09 fatcat:xs6v4myjvbfvhd3sbjbkjypoti

A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks

2022 International Journal of Communication Networks and Information Security  
However, the imminent arrival of quantum computing threatens the security of ELGAMAL cryptosystem and impose to cryptologists to prepare a resilient algorithm to quantum computer-based attacks.  ...  In this paper we will present a like-ELGAMAL cryptosystem based on the M1FP NP-hard problem. This encryption scheme is very simple but efficient and supposed to be resistant to post quantum attacks.  ...  that resist to post quantum attacks.  ... 
doi:10.17762/ijcnis.v14i1.5180 fatcat:powkalh5g5emlkciebzeau2cgi

Interactions between computer algebra (Gröbner bases) and cryptology

Jean-Charles Faugère
2009 Proceedings of the 2009 international symposium on Symbolic and algebraic computation - ISSAC '09  
The associated talk surveys how computer algebra techniques have been used to break several cryptosystems.  ...  but in the other way it is a NP-hard problem and it seems to be resistant against quantum computers.  ...  by quantum computing.  ... 
doi:10.1145/1576702.1576755 dblp:conf/issac/Faugere09 fatcat:fleynf4emzebxij5sb2emnolya

A Lightweight McEliece Cryptosystem Co-processor Design [article]

Lake Bu, Rashmi Agrawal, Hai Cheng, Michel A. Kinsy
2019 arXiv   pre-print
However, code-based cryptosystems are still secure against quantum computers, since the decoding of linear codes remains as NP-hard even on these computing systems.  ...  Quantum computers can solve many of the integer factorization and discrete logarithm problems efficiently.  ...  Both of them are able to construct public-key cryptosystems and key exchange mechanisms.  ... 
arXiv:1903.03733v2 fatcat:i7k3pfkyhjccbjcejg5htgb5ma

A Blockchain System Based on Quantum-Resistant Digital Signature

Peijun Zhang, Lianhai Wang, Wei Wang, Kunlun Fu, Jinpeng Wang
2021 Security and Communication Networks  
This paper presents a blockchain system based on lattice cipher, which can resist the attack of quantum computation.  ...  With the rapid development of quantum computation, elliptic curves cryptosystems used in blockchain are not secure enough.  ...  resist the attack of quantum algorithms is urgent. ankfully, through the continuous efforts of researchers, there have been a lot of public key cryptosystems that are quantum-resistant algorithms.  ... 
doi:10.1155/2021/6671648 doaj:b576f0e1d84f42a5be88c2700073add7 fatcat:xkw5zwer5jbanesa4imsr7woia

New Approach for CCA2-Secure Post-Quantum Cryptosystem Using Knapsack Problem [article]

Roohallah Rastaghi
2014 arXiv   pre-print
In this manuscript, for the first time, we propose a new approach for constructing post-quantum cryptosystems secure against adaptive chosen ciphertext attack (CCA2-secure) in the standard model using  ...  The computational version of the knapsack problem is NP-hard. Thus, this problem is expected to be difficult to solve using quantum computers.  ...  Public-key cryptosystems that can resist these emerging attacks are called quantum resistant or postquantum cryptosystems. A.  ... 
arXiv:1211.6984v5 fatcat:f6nucc7pfrblbetoso7h6awf2e

Hash Proof System Based on Lattice

Feng Xia, Bo Yang, Qiong Huang, Sha Ma
2012 International Journal of Advancements in Computing Technology  
Compared with previous cryptosystem based on lattice, our construction needs bigger public key space but fewer operations during encryption, and can resist quantum attacks because of the assumption on  ...  We also show how to construct a public-key encryption scheme which is semantically secure against key-leakage attacks in the standard model using our HPS based on lattice.  ...  In order to resist quantum attacks, there has been a recent rapid growth in post-quantum cryptography.  ... 
doi:10.4156/ijact.vol4.issue8.1 fatcat:44gkrtfkvzcgngtjtbkk2jtmsm

Development of crypto-code constructs based on LDPC codes

Serhii Pohasii, Serhii Yevseiev, Oleksandr Zhuchenko, Oleksandr Milov, Volodymyr Lysechko, Oleksandr Kovalenko, Maryna Kostiak, Andrii Volkov, Aleksandr Lezik, Vitalii Susukailo
2022 Eastern-European Journal of Enterprise Technologies  
The results of developing post-quantum algorithms of McEliece and Niederreiter crypto-code constructs based on LDPC (Low-Density Parity-Check) codes are presented.  ...  This approach provides the required level of security services (confidentiality, integrity, authenticity) in a full-scale quantum computer.  ...  be replaced by quantum-resistant ones.  ... 
doi:10.15587/1729-4061.2022.254545 fatcat:63mddjfirbehpdjqtg2o6j3nxe

Rank-Metric Codes and Their Applications

Hannes Bartz, Lukas Holzbaur, Hedongliang Liu, Sven Puchinger, Julian Renner, Antonia Wachter-Zeh
2022 Foundations and Trends in Communications and Information Theory  
In code-based cryptography, the hardness of the corresponding generic decoding problem can lead to systems with reduced public-key size.  ...  In distributed data storage, codes in the rank metric have been used repeatedly to construct codes with locality, and in coded caching, they have been employed for the placement of coded symbols.  ...  Since codebased public-key cryptosystems are resilient against all known attacks on quantum computers, including Shor's algorithm, they are considered to be quantum-resistant (or post-quantum secure) cryptosystems  ... 
doi:10.1561/0100000119 fatcat:4wh62agk5rczpjlfr5bp3km67u

Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling

Upendra Kapshikar, Ayan Mahalanobis
2021 Advances in Mathematics of Communications  
We prove, if these quasi-cyclic codes satisfy certain conditions, the corresponding Niederreiter cryptosystem is resistant to the hidden subgroup problem using weak quantum Fourier sampling.  ...  They are popular these days because they can be quantum-secure. In this paper, we study the Niederreiter cryptosystem using non-binary quasi-cyclic codes.  ...  Acknowledgments The first author was supported by Singapore Ministry of Education and the National Research Foundation through the core grants of the Centre for Quantum Technologies.  ... 
doi:10.3934/amc.2021062 fatcat:3mppxf52obbt7lenjgszourog4

Extended multivariate public key cryptosystems with secure encryption function

HouZhen Wang, HuanGuo Zhang, ZhangYi Wang, Ming Tang
2011 Science China Information Sciences  
As a promising candidate secure against attackers equipped with quantum computational power, multivariate public key cryptosystems (MPKCs) have attracted increasing attention in recently years.  ...  Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC.  ...  Consequently, we can construct a class of quantum resistant public key systems by choosing different central maps and hash functions.  ... 
doi:10.1007/s11432-011-4262-3 fatcat:xxojpuwgzfaxdhgwfn6tigrcgm

Post-Quantum Network Security:McEliece and Niederreiter Cryptosystems Analysis and Education Issues

2020 WSEAS transactions on systems and control  
The paper is aimed at analyzing of the classical McEliece and Niederreiter cryptosystems as well as theQuasi-Cyclic MDPC McEliece cipher in a context of the post-quantum network security.  ...  The binary Goppa codes are describedin the context of their role for the cryptanalytic resistance of the classic McEliece and Niederreiter schemes.  ...  CriCTechS seminar for discussion of the presented results.  ... 
doi:10.37394/23203.2020.15.62 fatcat:ycx2ry6l2bdvbeqr5qudu5uhb4

A quantum chaotic image cryptosystem and its application in IoT secure communication

Heping Wen, Chongfu Zhang, Ping Chen, Ruiting Chen, Jiajun Xu, Yunlong Liao, Zhonghao Liang, Danze Shen, Limengnan Zhou, Juxin Ke
2021 IEEE Access  
INDEX TERMS Secure communication, image encryption, Internet of Things, quantum chaos.  ...  The theoretical and statistical analysis results demonstrate that the cryptosystem has excellent performance and can resist various cryptographic attacks.  ...  Finally, we verify the proposed image cryptosystem on a general experimental platform of the Internet of Things.  ... 
doi:10.1109/access.2021.3054952 fatcat:si3uobhwtzdixgqptbhkzzpyve

An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network

Jinjing Shi, Shuhui Chen, Yuhu Lu, Yanyan Feng, Ronghua Shi, Yuguang Yang, Jian Li
2020 Scientific Reports  
It indicates an approach to design a quantum neural cryptosystem which contains the processes of key generation, encryption and decryption. Security analysis demonstrates that our scheme is security.  ...  8e - 2 regardless of classical or quantum data, and better performance can be achieved with the method of learning rate adaption (where increase factor R1 = 2, decrease factor R2 = 0.8).  ...  matched, which demonstrates that constructing a cryptosystem with CV-QNN is effective.  ... 
doi:10.1038/s41598-020-58928-1 pmid:32034194 pmcid:PMC7005808 fatcat:sorfryy7bnfvzcwjg2anemypxa

A Survey of Commercial Password Detection Methods

Zhou Yue, Ren Fengli, Shao Yong
2022 Mathematics and Computer Science  
In recent years, as the application of quantum computing in computer technology becomes more and more extensive, the performance of computers continues to improve, and cryptographic penetration technology  ...  The specific contents include traditional cryptanalysis methods, key penetration attack methods, side-channel attack methods, quantum computing cryptanalysis, etc.  ...  At the same time, I would also like to thank the authors of references and relevant researchers.  ... 
doi:10.11648/j.mcs.20220702.11 fatcat:htntdk5tjvg2lpnjwn4rkowmky
« Previous Showing results 1 — 15 out of 2,096 results