Affiliation:
1. V. N. Karazin Kharkiv National University
Abstract
The paper identifies and analyzes attacks aimed at Rainbow post-quantum electronic signature cryptanalysis. Today, due to advances in the quantum computers development, the need to present new standards for electronic signatures resistant to both quantum and classical cryptanalysis arisen. To solve the lack of such electronic signatures, NIST USA is running the NIST PQC competition. As part of this competition some electronic signatures designed to resist quantum cryptanalysis were presented, including Rainbow electronic signature. CZ-Rainbow and the compressed Rainbow algorithm were also presented along with the regular Rainbow algorithm. This paper analysis attacks on all three types of electronic signature. The possibility of a quantum attack against the Rainbow electronic signature, as well as the complexity of such an attack, defines the possibility of this electronic signature usage during the post-quantum period.
Publisher
National Academy of Sciences of Ukraine (Co. LTD Ukrinformnauka)
Reference9 articles.
1. Post-Quantum Cryptography PQC. Round 3 Submissions. NIST Computer Security Resource Center (CSRC). Information retrieval interaction. Retrieved from https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions.
2. PQC Standardization Process: Third Round Candidate Announcement. NIST Computer Security Resource Center (CSRC). July 22, 2020. Information retrieval interaction. Retrieved from https://csrc.nist.gov/News/2020/pqc-third-round-candidate-announcement.
3. Ding, J. Rainbow - Algorithm Specification and Documentation. The 3rd round Proposal. Department of Mathematical Sciences, University of Cincinnati.
4. Faugere, J.-C. (1999). A new efficient algorithm for computing Grobner Bases (F4). Journal of Pure and Applied Algebra, 139, 61-88. Information retrieval interaction. Retrieved from https://doi.org/10.1016/S0022-4049(99)00005-5.
5. Bettale, L., Faugere, J.-C., Perret, L. (2009). Hybrid approach for solving multivariate systems over finite fields. Journal of Mathematical Cryptology, 3, 177-197, 2009.