2024
DOI: 10.3390/computers13010026
|View full text |Cite
|
Sign up to set email alerts
|

Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1

Kunbolat Algazy,
Kairat Sakan,
Ardabek Khompysh
et al.

Abstract: The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used. This means that if the scheme is compromised, then one of these properties will be violated. It is important to note that the properties of cryptographic hash functions have been studied for many years, but if a specific hash function used in a protocol turns out to be insecure, it can … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
(22 reference statements)
0
2
0
Order By: Relevance
“…The proposed algorithm Syrga2 in its structure and operation is similar to the postquantum digital signature algorithm Syrga1 and is considered its modified version [21]. Syrga2 is a hash-based signature scheme, representing a stateful digital signature scheme.…”
Section: Description Of the Post-quantum Digital Signature Algorithm ...mentioning
confidence: 99%
“…The proposed algorithm Syrga2 in its structure and operation is similar to the postquantum digital signature algorithm Syrga1 and is considered its modified version [21]. Syrga2 is a hash-based signature scheme, representing a stateful digital signature scheme.…”
Section: Description Of the Post-quantum Digital Signature Algorithm ...mentioning
confidence: 99%
“…The development of computers based on quantum computation models is anticipated to negatively impact various cryptographic systems and key distribution protocols. While these quantum computers offer considerable benefits to information technology, particularly when paired with artificial intelligence, they also pose the risk of being utilized as powerful surveillance tools [1]. This has spurred a competition between quantum computers and the development of quantum-resistant cryptographic techniques.…”
Section: Introductionmentioning
confidence: 99%