Ponomar V. Models and methods of management and protection for cryptographic means in the post-quantum period

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0418U002016

Applicant for

Specialization

  • 05.13.21 - Системи захисту інформації

14-12-2017

Specialized Academic Board

Д 64.051.29

V.N.Karazin Kharkiv National University

Essay

The thesis is devoted to solving an important scientific problem, which consists in the development of security models and protection methods for cryptographic means in terms of threats with physical access and confirmation of origin, implementation of the safe manage-ment mechanisms for cryptographic means in information telecommunication system (ITS), assessment of the possibility of applying post-quantum algorithms in the cryptographic means. The object of the research – processes of cryptographic transformations. which are per-formed by cryptographic means, in order to perform of security services in the post-quantum period. Subject of research – mathematical models and methods of protection by cryptographic means in the information and telecommunication systems in the post-quantum period. In the thesis complex threat model for cryptographic means, which covers all stages of their distribution and exploitation was developed for the first time. Such model makes it possible to justify the requirements and determine the conditions for anonymity ensuring, safe man-agement, unauthorized access protection, meddling in the process of functioning, key compromising including in the post quantum period. The methods for cryptographic means safe management and using were improved due to specialized scripting language realization, which allows implementing the bucking requirements against insider attacks and executive instruction, which pose a threat to system operation. The evaluating methods of the post-quantum cryptographic primitives were improved. Introduced evaluating method differs from existent in that it uses several evaluating methods such as: hierarchy analysis method, based on pairwise comparison and weighting coefficient evaluation with rank order method, which uses peer review only for conditional tests weighting coefficient calculation, but for evaluation process itself objective characteristics and defined rating scale are used. That allowed to evaluate proposed post-quantum cryptographic al-gorithms mathematical models according to the criteria of security, complexity, and optimality. Security models and mechanisms of infor-mation protection in terms of using quantum crypto analysis methods and systems were developed. It was possible because of using the results of post quantum cryptographic algorithms candidates’ comparative analysis concerning their scope. That allowed to ground the re-quirements for post-quantum mechanisms of encryption and electronic signature as well as propose recommendations on their using in transitional and post quantum periods subject to space and time complexity restriction.

Files

Similar theses