The block symmetric ciphers in the post-quantum period

The paper displays the results of the research of symmetric cryptographic transformations that can be applied while using the quantum computing systems, so to say, in post-quantum period. For this purpose, we carried out the analysis and comparative study of the most common cryptographic algorithms that are standardized at the international and national levels, and also examined their ability to provide security services in post-quantum period.

[1]  I. D. Gorbenko,et al.  ENSEMBLE AND CORRELATION PROPERTIES OF CRYPTOGRAPHIC SIGNALS FOR TELECOMMUNICATION SYSTEM AND NETWORK APPLICATIONS , 2016 .

[2]  Roman Oliynykov,et al.  Improvement for distinguisher efficiency of the 3-round Feistel network and a random permutation , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.

[3]  V. M. Grachev,et al.  Data security mechanisms implemented in the database with universal model , 2014 .

[4]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[5]  Roman Oliynykov,et al.  A Method for Security Estimation of the Spn-Based Block Cipher Against Related-Key Attacks , 2014 .

[6]  I. Gorbenko,et al.  Methods of Information Protection in Communications Systems and Methods of Their Cryptoanalysis , 1998 .

[7]  Y. Stasev,et al.  Formation of pseudorandom sequences with improved autocorrelation properties , 2007 .

[8]  Alexandr Kuznetsov,et al.  The Design of Boolean Functions by Modified Hill Climbing Method , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[9]  Properties of Linear Transformations for Symmetric Block Ciphers on the Basis of MDS-Codes , 2011, 2011 Conference on Network and Information Systems Security.

[10]  Roman Oliynykov,et al.  Influence of addition modulo 2n on algebraic attacks , 2016, Cryptography and Communications.

[11]  Y. Stasev,et al.  Asymmetric Code-Theoretical Schemes Constructed with the Use of Algebraic Geometric Codes , 2005 .

[12]  V. M. Grachev,et al.  Technology for developing databases of information systems , 2014 .

[13]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..