პოსტკვანტური ფსევდო შემთხვევითი რიცხვების გენერატორები

ავტორი: A. Gagnidze, M. Iavich, G. Iashvili, T. Kuchukhidze
ორგანიზაცია: East West University, Caucasus University

კატეგორია:

საკვანძო სიტყვები: პოსტ-კვანტური; ფსევდო-შემთხვევითი; რიცხვების-გენერატორები; კრიპტოგრაფია; კიბერუსაფრთხოება
აბსტრაქტი. Ensuring high-quality randomness is a cornerstone of cryptographic security, as it underpins key generation, encryption protocols, and authentication mechanisms. Deterministic Random Bit Generators (DRBGs) play a critical role in providing pseudo-random outputs based on cryptographic techniques. This study explores various DRBGs, including Hash-DRBG, HMAC-DRBG, KHF-DRBG, AES-CTR DRBG, and TDEA-CTR DRBG, assessing their effectiveness within post-quantum cryptography (PQC). While Hash-DRBG and KHF-DRBG offer a balance of computational efficiency and security, HMAC-DRBG and AES-CTR DRBG demonstrate superior resistance to state compromise attacks. The adaptability of DRBGs to PQC depends on factors such as computational overhead, entropy sourcing, and resilience against emerging quantum threats. As cryptographic standards evolve, selecting DRBGs that maintain security and flexibility will be pivotal in safeguarding digital communications against quantum adversaries.

ბიბლიოგრაფია

D. R. L. Brown, "Breaking RSA may be as difficult as factoring," Journal of Cryptology, vol. 29, no. 1, pp. 220–241, 2016
M. Sharma et al., "Leveraging the power of quantum computing for breaking RSA encryption," Cyber-Physical Systems, vol. 7, no. 2, pp. 73–92, 2021
G. Alagic et al., "Status report on the third round of the NIST post-quantum cryptography standardization process," NIST Interagency/Internal Report, 2022
E. Barker, J. Kelsey, "NIST Special Publication 800-90A: Recommendation for random number generation using deterministic random bit generators," 2015
Y. Nir, A. Langley, "RFC 8439: ChaCha20 and Poly1305 for IETF Protocols," 2018
Iavich, Maksim, et al. "Novel certification method for quantum random number generators." International Journal of Computer Network and Information Security 13.3 (2021): 28-38
Gnatyuk, Sergiy, et al. "Improved Secure Stream Cipher for Cloud Computing." ICTERI Workshops. 2020
Iavich, Maksim, Avtandil Gagnidze, and Giorgi Iashvili. "Hash based digital signature scheme with integrated TRNG." CEUR Workshop Proceedings. Vol. 2145. 2018
Jintcharadze, E., and M. Iavich. "Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems. У 2020 IEEE East-West Design & Test Symposium (EWDTS)." IEEE. https://doi. org/10.1109/ewdts50664 (2020)
AbuGhanem, Muhammad. "Characterizing Grover search algorithm on large-scale superconducting quantum computers." Scientific Reports 15.1 (2025): 1281