Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives

Computationally complex tasks, or "hard problems" for brevity, is a broad term that encompasses problems that require a significant number of resources to solve. Cryptography uses them by establishing an equivalence between the security of a scheme and the intractability of a complex prob...

Full description

Saved in:
Bibliographic Details
Main Authors: Yevhen Kotukh, Hennadii Khalimov
Format: Article
Language:English
Published: Oles Honchar Dnipro National University 2024-06-01
Series:Challenges and Issues of Modern Science
Subjects:
Online Access:https://cims.fti.dp.ua/j/article/view/119
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823858776047878144
author Yevhen Kotukh
Hennadii Khalimov
author_facet Yevhen Kotukh
Hennadii Khalimov
author_sort Yevhen Kotukh
collection DOAJ
description Computationally complex tasks, or "hard problems" for brevity, is a broad term that encompasses problems that require a significant number of resources to solve. Cryptography uses them by establishing an equivalence between the security of a scheme and the intractability of a complex problem. Two hard problems have been widely used in public-key cryptography: integer factorization and the discrete logarithm problem. In 1994, Shor showed that these classical complex problems can be easily solved on a large-scale quantum computer.  Quantum-resistant cryptosystems based on lattices and other post-quantum candidates also exploit computationally complex tasks. We would venture to assume that any algorithm that has regularity properties in its structured data will be broken by a quantum computer. The properties of superposition and quantum entanglement make it possible to perform calculations on all states of the qubit register simultaneously. This property models the full set of states of a classical computer. The presence of regularity in the computational data of the algorithm, for example, periodicity (frequency resonances) in algebraic structures (rings, groups, lattices, etc.) can potentially be filtered by some algorithm with a complexity less than Grover's algorithm. In article, we propose to change the approach to the design of cryptosystems. We replace the concept of a problem that is difficult to solve with a problem that has many equivalent solutions without regularities when all solutions are equally likely. In this case, quantum cryptanalysis is reduced to Grover's scheme with exponential implementation complexity. We will set linear equations concerning the unknowns for which we use the values of the logarithmic signatures. The number of equations for secret values of logarithmic signatures is less than their number. This leads to an incomplete system of linear equations concerning unknowns and the impossibility of solving them in polynomial time.
format Article
id doaj-art-72e86dea17264dcea666e248b67ffa84
institution Kabale University
issn 3083-5704
language English
publishDate 2024-06-01
publisher Oles Honchar Dnipro National University
record_format Article
series Challenges and Issues of Modern Science
spelling doaj-art-72e86dea17264dcea666e248b67ffa842025-02-11T09:55:48ZengOles Honchar Dnipro National UniversityChallenges and Issues of Modern Science3083-57042024-06-012Advantages of Logarithmic Signatures in the Implementation of Crypto PrimitivesYevhen Kotukh0https://orcid.org/0000-0003-4997-620XHennadii Khalimov1https://orcid.org/0000-0002-2054-9186Dnipro University of TechnologyKharkiv National University of Radio Electronics Computationally complex tasks, or "hard problems" for brevity, is a broad term that encompasses problems that require a significant number of resources to solve. Cryptography uses them by establishing an equivalence between the security of a scheme and the intractability of a complex problem. Two hard problems have been widely used in public-key cryptography: integer factorization and the discrete logarithm problem. In 1994, Shor showed that these classical complex problems can be easily solved on a large-scale quantum computer.  Quantum-resistant cryptosystems based on lattices and other post-quantum candidates also exploit computationally complex tasks. We would venture to assume that any algorithm that has regularity properties in its structured data will be broken by a quantum computer. The properties of superposition and quantum entanglement make it possible to perform calculations on all states of the qubit register simultaneously. This property models the full set of states of a classical computer. The presence of regularity in the computational data of the algorithm, for example, periodicity (frequency resonances) in algebraic structures (rings, groups, lattices, etc.) can potentially be filtered by some algorithm with a complexity less than Grover's algorithm. In article, we propose to change the approach to the design of cryptosystems. We replace the concept of a problem that is difficult to solve with a problem that has many equivalent solutions without regularities when all solutions are equally likely. In this case, quantum cryptanalysis is reduced to Grover's scheme with exponential implementation complexity. We will set linear equations concerning the unknowns for which we use the values of the logarithmic signatures. The number of equations for secret values of logarithmic signatures is less than their number. This leads to an incomplete system of linear equations concerning unknowns and the impossibility of solving them in polynomial time. https://cims.fti.dp.ua/j/article/view/119computationally complex taskscryptographyquantum cryptographylogarithmic signatures
spellingShingle Yevhen Kotukh
Hennadii Khalimov
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Challenges and Issues of Modern Science
computationally complex tasks
cryptography
quantum cryptography
logarithmic signatures
title Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
title_full Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
title_fullStr Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
title_full_unstemmed Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
title_short Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
title_sort advantages of logarithmic signatures in the implementation of crypto primitives
topic computationally complex tasks
cryptography
quantum cryptography
logarithmic signatures
url https://cims.fti.dp.ua/j/article/view/119
work_keys_str_mv AT yevhenkotukh advantagesoflogarithmicsignaturesintheimplementationofcryptoprimitives
AT hennadiikhalimov advantagesoflogarithmicsignaturesintheimplementationofcryptoprimitives