The advent of quantum computers has brought forth a substantial danger to the security of current cryptographic algorithms, necessitating the development of quantum-resistant algorithms to ensure data protection. The ...
详细信息
The advent of quantum computers has brought forth a substantial danger to the security of current cryptographic algorithms, necessitating the development of quantum-resistant algorithms to ensure data protection. The encryption method proposed in this article uses polynomials and is intended to counter key size-based attacks. This paper brings a novel method of using polynomial interpolations for encryption and decryption, and the proposed algorithm is implemented in both classical and quantum environments to check its feasibility and accuracy. To ensure protection from the outside world, the proposed technique is applied in key generation, encryption, decryption, and confusion-diffusion modules. This article also tabulated the National Institute of Standard and Technology (NIST) test suit results for randomness acceptability criteria and compares the new algorithm with the Kyber algorithm. While quantum computers are believed to excel in tasks like factorization and optimization, this paper is the first to explore cryptography algorithms in a quantum environment, opening new research possibilities for future cryptographic developments.
A practical key substitution attack on SFLASH(v3) is described: Given a valid (message, signature) pair (m, sigma) for some public key v(0), one can derive another public key v(1) (along with matching secret data) suc...
详细信息
A practical key substitution attack on SFLASH(v3) is described: Given a valid (message, signature) pair (m, sigma) for some public key v(0), one can derive another public key v(1) (along with matching secret data) such that (m, sigma) is also valid for v(1). The computational effort needed for finding such a 'duplicate' key is comparable to the effort needed for ordinary key generation.
暂无评论