Abstract
The article presents research in the field of development and improvement of cryptographic systems based on elliptic curves isomorphic transformations potentially resistant to quantum cryptanalysis. Analysis results of existing asymmetric cryptosystems disadvantages and advantages, including those based on isomorphic transformations, are presented. The approaches to the construction of cryptographic algorithms based on isogenies of elliptic curves, which can become the basis for creating cryptosystems resistant to quantum attacks, are investigated.
In the course of the research, program functions were developed to implement operations on elliptic curves isogenies of different orders, which will ensure the security levels specified in the standard: 256, 384, 512. A software implementation of the operations of a curve point scalar multiplication and operations on elliptic curve isogenies has been developed, on the basis of which experimental values of the time to perform the scalar product using parallelization have been obtained. Experiments have been conducted to compare the classical multiplication of a curve point with the representation of the scalar k as a sequence of 4-bit words, which made it possible to speed up the scalar multiplication operation by 30 times, for 8-bit words the speedup was 18.8 times.
The direction of further research is the development of methods for the generation and verification of a digital signature, based on transformations over the isogeny points of the elliptic curve using the parallelization of operations of scalar multiplication of the curve point.
Publisher
Scientific Journals Publishing House
Reference21 articles.
1. Rivest, Shamir A., Adleman L. A method for obtaining digital signatures and public-key cryptosystems // Communications of the ACM. New York City: Association for Computing Machinery. 1978. Vol. 21, Iss. 2. P. 120–126. ISSN 0001-0782; 1557-7317. DOI: 10.1145/359340.359342.
2. Bernstein, Lange T., Niederhagen R. Dual EC: A Standardized Back Door // Cryptology ePrint Archive, Report 2015. P. 767. URL: https://projectbullrun.org/dual-ec/documents/dual-ec-20150731.pdf.
3. Shor W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. Foundations of Computer Science: Conference Publications. 1997. P. 1484–1509.
4. Alkim, Ducas L., Pöppelmann T., Schwabe P. Post-quantum key exchange – a new hope // IACR Cryptology ePrint Archive, Report 2015/1092, 2015.
5. Husemöller, Theisen S., Forster O., Lawrence R. Elliptic Curves, Second Edition // Springer. 2002. P. 487.