Hybrid post quantum crypto system

Authors: M.Iavich*, A.Gagnidze**, G.Iashvili*
Affiliation: Caucasus University*, International Black Sea University**

Category:

Keywords: hybrid, post-quantum, quantum
ABSTRACT. Scientists are actively working on the creation of quantum computers. Quantum computers can easily solve the problem of factoring large numbers. Because of this, quantum computers are able to crack the crypto RSA system, which is used in many products. In the article it is proposed to replace the hash function with a lattice-based hash function in the standard Merkle scheme, and to use a one-way lattice-based function as a one-way function.

References:

Avtandil Gagnidze, Maksim Iavich, Giorgi Iashvili// Novel Version of Merkle Cryptosystem// BULLETIN OF THE GEORGIAN NATIONAL ACADEMY OF SCIENCES, vol. 11, no. 4, 2017, p. 28-33
Явич М.П., Аракелян А.А. Реализация крипто-системы Merkle и ее анализ // Современные научные исследования и инновации. 2017. № 6 [Электронный ресурс]. URL: http://web.snauka.ru/issues/2017/06/83971
C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang and J. Chen, MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud, in IEEE Transactions on Computers, vol. 64, no. 9, pp. 2609-2622, 2015.doi:10.1109/TC.2014.2375190
Amy M., Di Matteo O., Gheorghiu V., Mosca M., Parent A., Schanck J. (2017) Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3. In: Avanzi R., Heys H. (eds) Selected Areas in Cryptography – SAC 2016. SAC 2016. Lecture Notes in Computer Science, vol 10532. Springer
Cham Güneysu T., Lyubashevsky V., Pöppelmann T. (2012) Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems. In: Prouff E., Schaumont P. (eds) Cryptographic Hardware and Embedded Systems – CHES 2012. CHES 2012. Lecture Notes in Computer Science, vol 7428. Springer, Berlin, Heidelberg