{"id":2685,"date":"2024-05-15T09:24:40","date_gmt":"2024-05-15T06:24:40","guid":{"rendered":"https:\/\/fti.dp.ua\/conf\/?p=2685"},"modified":"2024-05-15T09:24:41","modified_gmt":"2024-05-15T06:24:41","slug":"05157-0924","status":"publish","type":"post","link":"https:\/\/fti.dp.ua\/conf\/2024\/05157-0924\/","title":{"rendered":"Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives"},"content":{"rendered":"\n<h1 class=\"wp-block-heading citation_title\">Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives<\/h1>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h5 class=\"wp-block-heading citation_author\"><strong><strong><strong><strong><strong>Yevhen Kotukh<\/strong><\/strong><\/strong><\/strong><\/strong><\/h5>\n\n\n\n<p class=\"citation_author_url\"><em>ORCID: <a href=\"https:\/\/orcid.org\/0000-0003-4997-620X\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/orcid.org\/0000-0003-4997-620X<\/a><\/em><\/p>\n\n\n\n<p><em>Dnipro University of Technology<\/em><\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h5 class=\"wp-block-heading citation_author\"><strong><strong><strong><strong><strong>Hennadii Khalimov<\/strong><\/strong><\/strong><\/strong><\/strong><\/h5>\n\n\n\n<p class=\"citation_author_url\"><em>ORCID: <a href=\"https:\/\/orcid.org\/0000-0002-2054-9186\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/orcid.org\/0000-0002-2054-9186<\/a><\/em><\/p>\n\n\n\n<p><em>Kharkiv National University of Radio Electronics<\/em><\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Computationally complex tasks, or &#8220;hard problems&#8221; for brevity, is a broad term that encompasses problems that require a significant number of resources to solve. Cryptography uses them by establishing an equivalence between the security of a scheme and the intractability of a complex problem. Two hard problems have been widely used in public-key cryptography: integer factorization and the discrete logarithm problem. In 1994, Shor showed that these classical complex problems can be easily solved on a large-scale quantum computer.\u00a0<br>Quantum-resistant cryptosystems based on lattices and other post-quantum candidates also exploit computationally complex tasks. We would venture to assume that any algorithm that has regularity properties in its structured data will be broken by a quantum computer. The properties of superposition and quantum entanglement make it possible to perform calculations on all states of the qubit register simultaneously. This property models the full set of states of a classical computer. The presence of regularity in the computational data of the algorithm, for example, periodicity (frequency resonances) in algebraic structures (rings, groups, lattices, etc.) can potentially be filtered by some algorithm with a complexity less than Grover&#8217;s algorithm. In article, we propose to change the approach to the design of cryptosystems. We replace the concept of a problem that is difficult to solve with a problem that has many equivalent solutions without regularities when all solutions are equally likely. In this case, quantum cryptanalysis is reduced to Grover&#8217;s scheme with exponential implementation complexity. We will set linear equations concerning the unknowns for which we use the values of the logarithmic signatures. The number of equations for secret values of logarithmic signatures is less than their number. This leads to an incomplete system of linear equations concerning unknowns and the impossibility of solving them in polynomial time.<\/p>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/cims.fti.dp.ua\/j\/article\/view\/119\" target=\"_blank\" rel=\"noreferrer noopener\">FULL TEXT<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-content-justification-right is-layout-flex wp-container-core-group-is-layout-b6c475e2 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-content-justification-right is-nowrap is-layout-flex wp-container-core-group-is-layout-fd526d70 wp-block-group-is-layout-flex\"><div class=\"taxonomy-post_tag wp-block-post-terms\"><a href=\"https:\/\/fti.dp.ua\/conf\/tag\/cims-2024-vernal\/\" rel=\"tag\">CIMS 2024 Vernal<\/a><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2024-05-15T09:24:40+03:00\">May 15, 2024<\/time><\/div><\/div>\n\n\n<div class=\"taxonomy-category wp-block-post-terms\"><a href=\"https:\/\/fti.dp.ua\/conf\/session\/info-tech-2\/\" rel=\"tag\">Information Technology and Cybersecurity<\/a><\/div><\/div>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives Yevhen Kotukh ORCID: https:\/\/orcid.org\/0000-0003-4997-620X Dnipro University of Technology Hennadii Khalimov ORCID: https:\/\/orcid.org\/0000-0002-2054-9186 Kharkiv National University of Radio Electronics Computationally complex tasks, or &#8220;hard problems&#8221; for brevity, is a broad term that encompasses problems that require a significant number of resources to solve. Cryptography uses them by establishing an equivalence between the security of a scheme and the intractability of a complex problem. Two hard problems have been widely used in &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[29],"class_list":["post-2685","post","type-post","status-publish","format-standard","hentry","category-info-tech-2","tag-cims-2024-vernal"],"_links":{"self":[{"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/posts\/2685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/comments?post=2685"}],"version-history":[{"count":1,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/posts\/2685\/revisions"}],"predecessor-version":[{"id":2686,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/posts\/2685\/revisions\/2686"}],"wp:attachment":[{"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/media?parent=2685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/categories?post=2685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fti.dp.ua\/conf\/wp-json\/wp\/v2\/tags?post=2685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}