Application of Algorithms on Lattices in Post-Quantum Cryptography
The article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum cryptographic encryption systems. One of the most promising approaches is considered, which is based on the theory of lattices. Difficult-to-solve proble...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
The Fund for Promotion of Internet media, IT education, human development «League Internet Media»
2024-03-01
|
| Series: | Современные информационные технологии и IT-образование |
| Subjects: | |
| Online Access: | http://sitito.cs.msu.ru/index.php/SITITO/article/view/1059 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849387591350091776 |
|---|---|
| author | Nikolai Urban Elena Melnikova |
| author_facet | Nikolai Urban Elena Melnikova |
| author_sort | Nikolai Urban |
| collection | DOAJ |
| description | The article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum cryptographic encryption systems. One of the most promising approaches is considered, which is based on the theory of lattices. Difficult-to-solve problems are presented, on the basis of which cryptographic primitives of lattice theory are constructed. The article discusses in more detail the Goldreich Goldwasser Halevi encryption scheme based on the theory of lattices. The article presents a software package that allows the user to study the main functions of the GGH scheme: key generation algorithms, encryption algorithms and message decryption. The article specifies the main purposes of the modules of the software package, and describes the user interface of the program. Also, the software package makes it possible to carry out an attack on the encryption scheme using the Lenstra-Lenstra-Lovasz algorithm. This application can be used as part of a laboratory complex when studying. |
| format | Article |
| id | doaj-art-2509f21a69c747ed8f4acf8bc1425021 |
| institution | Kabale University |
| issn | 2411-1473 |
| language | Russian |
| publishDate | 2024-03-01 |
| publisher | The Fund for Promotion of Internet media, IT education, human development «League Internet Media» |
| record_format | Article |
| series | Современные информационные технологии и IT-образование |
| spelling | doaj-art-2509f21a69c747ed8f4acf8bc14250212025-08-20T03:51:35ZrusThe Fund for Promotion of Internet media, IT education, human development «League Internet Media»Современные информационные технологии и IT-образование2411-14732024-03-01201273310.25559/SITITO.020.202401.27-33Application of Algorithms on Lattices in Post-Quantum CryptographyNikolai Urban0https://orcid.org/0000-0002-8047-1499Elena Melnikova1https://orcid.org/0000-0003-1997-1846Russian State Social University, Moscow, RussiaRussian State Social University, Moscow, RussiaThe article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum cryptographic encryption systems. One of the most promising approaches is considered, which is based on the theory of lattices. Difficult-to-solve problems are presented, on the basis of which cryptographic primitives of lattice theory are constructed. The article discusses in more detail the Goldreich Goldwasser Halevi encryption scheme based on the theory of lattices. The article presents a software package that allows the user to study the main functions of the GGH scheme: key generation algorithms, encryption algorithms and message decryption. The article specifies the main purposes of the modules of the software package, and describes the user interface of the program. Also, the software package makes it possible to carry out an attack on the encryption scheme using the Lenstra-Lenstra-Lovasz algorithm. This application can be used as part of a laboratory complex when studying.http://sitito.cs.msu.ru/index.php/SITITO/article/view/1059post-quantum encryption algorithmscryptosystemqubitgoldreich goldwasser halevi schemelattice-based cryptography |
| spellingShingle | Nikolai Urban Elena Melnikova Application of Algorithms on Lattices in Post-Quantum Cryptography Современные информационные технологии и IT-образование post-quantum encryption algorithms cryptosystem qubit goldreich goldwasser halevi scheme lattice-based cryptography |
| title | Application of Algorithms on Lattices in Post-Quantum Cryptography |
| title_full | Application of Algorithms on Lattices in Post-Quantum Cryptography |
| title_fullStr | Application of Algorithms on Lattices in Post-Quantum Cryptography |
| title_full_unstemmed | Application of Algorithms on Lattices in Post-Quantum Cryptography |
| title_short | Application of Algorithms on Lattices in Post-Quantum Cryptography |
| title_sort | application of algorithms on lattices in post quantum cryptography |
| topic | post-quantum encryption algorithms cryptosystem qubit goldreich goldwasser halevi scheme lattice-based cryptography |
| url | http://sitito.cs.msu.ru/index.php/SITITO/article/view/1059 |
| work_keys_str_mv | AT nikolaiurban applicationofalgorithmsonlatticesinpostquantumcryptography AT elenamelnikova applicationofalgorithmsonlatticesinpostquantumcryptography |