FIELD: radio engineering, communication.
SUBSTANCE: Weber function-based quantum attack-secure encryption method employs Weber function cycles for elliptical curves on a number comparable with 1 modulo 8, and the cycles are determined by low-order Elkies isogenies. The next value of the Weber function is found as a root of an integer-valued symmetrical multinomial. The secret key is a list of integers (N1, …, Nk), where Ni is the number of steps performed per cycle of Weber functions for an Elkies isogeny of the order li, and the public key is a value of the Weber function of the last isogeny. A positive direction on the cycle is given during the first calculation of the Weber function for the isogeny of the order l. To this end, the isogeny core is selected as divider of the power of the (l-1)/2 l-th division polynomial which determines the minimum expansion ratio in which points of the core lie, and the three most-significant coefficients of the polynomial, which defines the core, are used to calculate coefficients of the isogenic image of the elliptical curve. Steps on the cycle are performed according to the sign of the number Ni.
EFFECT: protection from quantum attacks.
3 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
USING ISOGENIES TO DESIGN CRYPTOSYSTEMS | 2004 |
|
RU2376651C2 |
KEY MATCHING PROTOCOL BASED ON ELLIPTIC CURVE ISOGENY | 2018 |
|
RU2728519C1 |
MODULAR POLYNOMIAL COMPUTER OF BOOLEAN FUNCTION SYSTEMS | 2015 |
|
RU2586575C1 |
POLYNOMIAL MODULAR COMPUTER SYSTEMS OF BOOLEAN FUNCTIONS WITH ERROR DETECTION | 2015 |
|
RU2586574C1 |
ELLIPTIC CURVE-BASED ELECTRONIC DIGITAL SIGNATURE METHOD | 2010 |
|
RU2457625C1 |
CRYPTOGRAPHY WITH PARAMETERISATION ON ELLIPTIC CURVE | 2010 |
|
RU2533087C2 |
METHOD OF PROTECTING INFORMATION IN CLOUD COMPUTING USING HOMOMORPHIC ENCRYPTION | 2017 |
|
RU2691874C2 |
DEVICE FOR SPECTRAL DETECTION AND CORRECTION OF ERRORS IN CODES OF POLYNOMIAL RESIDUE CLASSES SYSTEM | 2005 |
|
RU2301441C2 |
METHOD FOR THRESHOLD KEY GENERATING FOR PROTECTION SYSTEM BASED ON IDENTITY DATA | 2010 |
|
RU2452111C1 |
METHOD FOR GENERATION AND AUTHENTICATION OF ELECTRONIC DIGITAL SIGNATURE THAT VERIFIES ELECTRONIC DOCUMENT | 2008 |
|
RU2392736C1 |
Authors
Dates
2015-02-20—Published
2013-11-20—Filed