{"title":"RAINBOW算法及其抵抗RBS攻击和第三方通道的能力","authors":"D. Harmash","doi":"10.30837/rt.2022.2.209.05","DOIUrl":null,"url":null,"abstract":"The essence and possibilities of protecting the Rainbow post-quantum cryptographic algorithm are considered. The main properties of algorithms based on multidimensional quadratic transformations are studied. An assessment is given of what resources and computational energy are needed for the successful use of algorithms based on multidimensional quadratic transformations. The ability to protect the algorithm against attacks by third-party channels is analyzed. It is studied how successfully a cryptographic algorithm based on Rainbow multivariate quadratic transformations can withstand RBS attacks. A detailed description of the steps used to build an attack on a cryptographic algorithm based on Rainbow multivariate quadratic transforms is given. A structural analysis of the Rainbow algorithm is performed. Detailed conclusions are made regarding the performed analyzes. An assessment of the stability and complexity of the cryptographic encryption algorithm and electronic signature based on multivariate quadratic transformations is given.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.2000,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"RAINBOW algorithm and its ability to resist RBS attacks and third party channels\",\"authors\":\"D. Harmash\",\"doi\":\"10.30837/rt.2022.2.209.05\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The essence and possibilities of protecting the Rainbow post-quantum cryptographic algorithm are considered. The main properties of algorithms based on multidimensional quadratic transformations are studied. An assessment is given of what resources and computational energy are needed for the successful use of algorithms based on multidimensional quadratic transformations. The ability to protect the algorithm against attacks by third-party channels is analyzed. It is studied how successfully a cryptographic algorithm based on Rainbow multivariate quadratic transformations can withstand RBS attacks. A detailed description of the steps used to build an attack on a cryptographic algorithm based on Rainbow multivariate quadratic transforms is given. A structural analysis of the Rainbow algorithm is performed. Detailed conclusions are made regarding the performed analyzes. An assessment of the stability and complexity of the cryptographic encryption algorithm and electronic signature based on multivariate quadratic transformations is given.\",\"PeriodicalId\":41675,\"journal\":{\"name\":\"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2022-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30837/rt.2022.2.209.05\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30837/rt.2022.2.209.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
RAINBOW algorithm and its ability to resist RBS attacks and third party channels
The essence and possibilities of protecting the Rainbow post-quantum cryptographic algorithm are considered. The main properties of algorithms based on multidimensional quadratic transformations are studied. An assessment is given of what resources and computational energy are needed for the successful use of algorithms based on multidimensional quadratic transformations. The ability to protect the algorithm against attacks by third-party channels is analyzed. It is studied how successfully a cryptographic algorithm based on Rainbow multivariate quadratic transformations can withstand RBS attacks. A detailed description of the steps used to build an attack on a cryptographic algorithm based on Rainbow multivariate quadratic transforms is given. A structural analysis of the Rainbow algorithm is performed. Detailed conclusions are made regarding the performed analyzes. An assessment of the stability and complexity of the cryptographic encryption algorithm and electronic signature based on multivariate quadratic transformations is given.