FOR PSEUDORANDOM SEQUENCES BASED ON ELLIPTIC CURVE ISOGENIES GENERATING METHOD

Author:

Lavryk I.ORCID,Pryima O.ORCID

Abstract

The pseudorandom sequences generation is a cryptographic systems fundamental aspect that affects cryptographic strength. One of these sequences advanced generating methods involves the use of elliptic curves (ECs), in particular by exploiting the isogeny properties of ECs. This approach not only improves the security features of cryptographic algorithms, but also ensures efficiency and reliability in the generation process. The use of isogenic transformations - morphisms between elliptic curves that preserve their group structure - further enriches the technique by introducing complex algebraic operations that are difficult to solve. Recent research has detailed the effectiveness of pseudorandom sequence generators based on elliptic curves. Methods have been developed that exploit the properties of elliptic curves over finite fields to generate sequences with low correlation and high linear complexity. There is also another approach that uses linear shift feedback registers (LFSRs) in combination with elliptic curve points to generate pseudorandom sequences. The new obtained method makes it possible to increase the number of internal states of the Dual_EC_DRBG generator by √n times, where n is the number of cyclic subgroups of simple order of the initial curve. This increases the complexity of disclosing the law of formation of the DRBG by an attacker. The application of the developed method also allows to avoid the existing disadvantages of Dual_EC_DRBG The article investigates the use of EC isogenies in the generation of pseudorandom sequences, considering their potential for improving cryptographic strength. By means of a detailed analysis of the algebraic structure and properties of these transformations, a method for PSPs generating is developed that can potentially provide advantages over existing methods in terms of security and efficiency in the transition period to post-quantum cryptography.

Publisher

State Scientific Research Institute of Armament and Military Equipment Testing and Certification

Reference10 articles.

1. NIST SP 800-90A Rev. 1. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. Elaine Barker (NIST), John Kelsey (NIST).

2. Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM. A. Jalali, R. Azarderakhsh, Mehran Mozaffari Kermani and David Jao. // IEEE Transactions on Dependable and Secure Computing, 16 . – 2019 – С.902-912.

3. An efficient key recovery attack on SIDH (preliminary version). Castryck, W., Decru, T // IACR Cryptol. ePrint Arch. – 2022. – С. 975.

4. Метод генерації псевдовипадкових послідовностей на основі ізоморфних трансформацій еліптичної кривої/ А.В. Бессалов, В.Є. Чевардін // Прикладна радіоелектроніка: наук.-техн. журнал. – 2012. – Том 11. № 2. – С. 234–237.

5. Kaliski Jr. B. S. A pseudo-random bit generator based on elliptic logarithms / B. S. Kaliski Jr. // Advances in Cryptology: Proceedings of Crypto '86 (Lecture Notes in Computer Science, vol. 263), Springer-Verlag, New York, 1987, pp. 84-103.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3