Developing Secure Messaging Software using Post-Quantum Cryptography

被引:0
|
作者
Nguyen, Tat-Thang [1 ]
Luc, Nhu-Quynh [2 ]
Dao, Toan Thanh [1 ]
机构
[1] Univ Transport & Commun, Hanoi, Vietnam
[2] Acad Cryptog Tech, Hanoi, Vietnam
关键词
-CSIDH; AES; Rainbow; UOV; post quantum;
D O I
10.48084/etasr.6549
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, a technique to develop a secure messaging service utilizing a new post-quantum cryptosystem, termed CryptoMess, is proposed. Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) is utilized to secure key exchange paired with the AES algorithm to protect message content in communication. At the same time, the Rainbow post-quantum digital signature technology is incorporated to assure the integrity and authenticity of communications between the sender and the recipient. As a consequence, the messaging program is able to exchange messages between users, assuring safety, security, integrity, and authenticity. The performance of the program has a transmitting rate of approximately 0.26 s and a receiving rate of approximately 0.22 s. The message signing time is approximately 0.027 s, the message verification speed is approximately 0.22 s, and the key exchange time is approximately 0.0017s.
引用
收藏
页码:12440 / 12445
页数:6
相关论文
共 50 条
  • [1] Post-quantum Secure Group Messaging
    Bobrysheva, Julia
    Zapechnikov, Sergey
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 2323 - 2326
  • [2] Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution
    Aquina, Nick
    Rommel, Simon
    Monroy, Idelfonso Tafur
    2024 24TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, ICTON 2024, 2024,
  • [3] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [4] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [5] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194
  • [6] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [7] Applications of Post-Quantum Cryptography
    Bagirovs, Emils
    Provodin, Grigory
    Sipola, Tuomo
    Hautamaki, Jari
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 49 - 57
  • [8] Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design
    Bellizia, Davide
    El Mrabet, Nadia
    Fournaris, Apostolos P.
    Pontie, Simon
    Regazzoni, Francesco
    Standaert, Francois-Xavier
    Tasso, Elise
    Valea, Emanuele
    34TH IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT 2021), 2021,
  • [9] Authentication Protocol for Secure Automotive Systems: Benchmarking Post-Quantum Cryptography
    Ravi, Prasanna
    Sundar, Vijaya Kumar
    Chattopadhyay, Anupam
    Bhasin, Shivam
    Easwaran, Arvind
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [10] Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography
    Debnath, Sumit Kumar
    Mesnager, Sihem
    Dey, Kunal
    Kundu, Nibedita
    MEDITERRANEAN JOURNAL OF MATHEMATICS, 2021, 18 (05)