BUILDING AND DEVELOPING A DATA PROTECTION SERVICE SYSTEM BASED ON POST-QUANTUM CRYPTOGRAPHY SOLUTIONS
- Authors: Nguyen T.1, Quach D.2, Dao T.1, Luc N.3
-
Affiliations:
- University of Transport and Communications
- Center 3, Command 86
- Academy of Cryptography Techniques
- Issue: No 5 (2025)
- Pages: 22–34
- Section: INFORMATION SECURITY
- URL: https://ogarev-online.ru/0132-3474/article/view/378353
- DOI: https://doi.org/10.7868/S3034584725050033
- ID: 378353
Cite item
Abstract
Keywords
About the authors
Tat-Thang Nguyen
University of Transport and Communications
Email: quynhln@actvn.edu.vn
Vietnam
Duc-Huy Quach
Center 3, Command 86Vietnam
Toan-Thanh Dao
University of Transport and CommunicationsVietnam
Nhu-Quynh Luc
Academy of Cryptography Techniques
Email: daotoan@utc.edu.vn
Vietnam
References
- Bernstein D.J., Lange T. Post-quantum cryptography // Nature. 2017. V. 549. № 7671. P. 188-194. doi: 10.1038/nature23461.
- Soni D., Basu K., Nabeel M., Aarai N., Manzano M., Karri R. FALCON // Hardware Architectures for Post-Quantum Digital Signature Schemes. Cham: Springer International Publishing, 2021. P. 31-41. doi: 10.1007/978-3-030-57682-0_3.
- Hekkala J., Muurman M., Halunen K., Vallivaara V. Implementing Post-quantum Cryptography for Developers // SN Computer Science. 2023. V. 4. № 4.
- Bos J. et al. CRYSTALS-Kyber: A CCA-Secure Module-Lattice-Based KEM // 2018 IEEE European Symposium on Security and Privacy (EuroS&P). Apr. 2018. P. 353-367. doi: 10.1109/EuroSP.2018.00032.
- Bai S., Galbraith S.D., Li L., Sheffield D. Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem // Journal of Cryptology. 2019. V. 32. № 1. P. 35-83. doi: 10.1007/s00145-018-9304-1.
- Regev O. On lattices, learning with errors, random linear codes, and cryptography // Journal of the ACM (JACM). 2009. V. 56. № 6. P. 1-40. doi: 10.1145/1568318.1568324.
- David N., Naya-Plasencia M., Schrottenloher A. Quantum impossible differential attacks: applications to AES and SKINNY // Designs, Codes and Cryptography. 2024. V. 92. № 3. P. 723-751. doi: 10.1007/s10623-023-01280-y.
- Luc N.-Q., Nguyen T.-T., Vu C.-H., Quach D.-H., Dao T.-T. Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem // Programming and Computer Software. 2024. V. 50. № 4. P. 322-333. doi: 10.1134/S0361768824700130.
- Prokop M., Wallden P., Joseph D. Grover's oracle for the Shortest Vector Problem and its application in hybrid classical-quantum solvers // arXiv preprint arXiv:2402.13895, February 2024.
- Harmalkar M., Jain K., Krishnan P. A Survey of Post Quantum Key Encapsulation Mechanism // Proceedings of the 2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI). January 2024. P. 141-149. doi: 10.1109/ICMCSI61536/2024/00028.
- Rescorla E. The Transport Layer Security (TLS) Protocol Version 1_3 // RFC8446, August 2018. https://doi.org/10/17487/RFC8446
- Singh A.P., Singh M. Handshake Comparison Between TLS V1_2 and TLS V1_3 Protocol // Proceedings of the International Conference on Advances in Computing and Data Sciences (ICACDS). Singapore: Springer Singapore, 2022. P. 143-155. doi: 10.1007/978-981-16-8012-0_12.
- Oluwatosin H.S. Client-Server Model // IOSR Journal of Computer Engineering. 2014. V. 16. № 1. P. 57-71. DOI: 10/9790/0661-16195771.
- Tian Y.-C., Gao J. Building TCP/IP Socket Applications // Berlin: Springer Nature Switzerland AG, 2024. DOI: 10/978-981-99-5648-7_13.
- Reddy D.S.P., Pranav Y.S., Kora P., Arvind V. Smart Mirror Using Raspberry Pi 4 // Proceedings of the International Conference on Advances in Computing and Data Sciences (ICACDS). Singapore: Springer Singapore, 2023. P. 25-33. DOI: 10/978-981-19-8497-6_3.
- Zych M.D. Quantum Safe Cryptography Based on Hash Functions: A Survey // University of Oslo, Department of Informatics. Oslo: University of Oslo Press, 2018.
- Kumar R.K., Yogesh M.H., Prasad K. Raghavendra, Sharankumar S., Sabareesh S. 256-Bit AES Encryption Using SubBytes Blocks Optimisation // Proceedings of the International Conference on Advanced Computing Technologies (ICACT), January 2024. P. 621-628. DOI: 10/978-981-99-7954-7_56.
- Lu J., Zhou W. Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher // Designs, Codes and Cryptography. 2024. V. 92. № 4. P. 957-973. doi: 10.1007/s10623-023-01323-4.
- Guo J., Song L., Wang H. Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256 // Proceedings of the International Conference on Information Security and Cryptology (ISC). 2022. P. 3-23. doi: 10.1007/978-3-031-22301-3_1.
- Baek S., Cho S., Kim J. Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions // Quantum Information Processing. 2022. V. 21. № 5. P. 163. doi: 10.1007/s11128-022-03499-5.
- Holz R., Amann J., Razaghpanah A., Vallina-Rodriguez N. The Era of TLS1_3: Measuring Deployment and Use with Active and Passive Methods, July 2019. https://doi.org/10.48550/arXiv.1907.12762
- Scheife Q. et al. A First Look at Certification Authority Authorization (CAA) // ACM SIGCOMM Computer Communication Review. 2018. V. 48. № 2. P. 10-23. doi: 10.1145/321232.3213235.
- Farhan S.M., Chung T. Exploring the Evolution of TLS Certificates // Proceedings of the International Conference on Network Security and Blockchain Technology (NSBT). 2023. P. 71-84. doi: 10.1007/978-3-031-28486-1_4.
- Kannwischer K.S., Matthias J., Rijneveld J., Schwabe P. pqm4: Testing and benchmarking NIST PQC on ARM Cortex-M, Second PQC Standardization Conference. Santa Barbara, CA: University of California, 2019.
Supplementary files


