Development of an improved SSL/TLS protocol using post-quantum algorithms

dc.contributor.authorYevseiev, Serhii
dc.contributor.authorHavrylova, Alla
dc.contributor.authorMilevskyi, Stanislav
dc.contributor.authorSinitsyn, Igor
dc.contributor.authorChalapko, Volodymyr
dc.contributor.authorDukin, Hennady
dc.contributor.authorHrebeniuk, Vitalii
dc.contributor.authorDiedov, Mykhailo
dc.contributor.authorBekirova, Lala
dc.contributor.authorShpak, Oleksandr
dc.date.accessioned2025-04-21T07:46:46Z
dc.date.issued2023
dc.description.abstractThe development of Internet technologies together with mobile and computer technologies have formed smart technologies that allow the formation of both cyber-physical and socio-cyber-physical systems. The basis of smart technologies is the integration of wireless channel standards with mobile and computer protocols. 4G/5G technologies are integrated with various web platforms, taking into account the digitalization of services in cyberspace. But the SSL/TLS protocol, based on the hybridization of symmetric encryption algorithms with hashing algorithms (AEAD mode), which is supposed to provide security services, is vulnerable to “Meet in the middle”, POODLE, BEAST, CRIME, BREACH attacks. In addition, with the advent of a full-scale quantum computer, symmetric and asymmetric cryptography algorithms that provide security services can also be hacked. To increase the level of security, an improved protocol based on post-quantum algorithms – crypto-code constructions is proposed, which will ensure not only resistance to current attacks, but also stability in the post-quantum period. To ensure the “hybridity” of services, it is proposed to use the McEliece and Niederreiter crypto-code constructions (confidentiality and integrity are ensured) and the improved UMAC algorithm on the McEliece crypto-code construction. Taking into account the level of “secrecy” of information, it is suggested to use various combinations of crypto-code constructions on different algebraic geometric and/or flawed codes. The use of crypto-code constructions not only provides resistance to attacks, but also simplifies the formation of a connection – the parameters of elliptic curves are used to transmit a common key. This approach significantly reduces the connection time of mobile gadgets and simplifies the procedure of agreement before data transfer.
dc.identifier.citationDevelopment of an improved SSL/TLS protocol using post-quantum algorithms / Serhii Yevseiev [et al.] // Eastern-European Journal of Enterprise Technologies. – 2023. – Vol. 3, No. 9 (123). – P. 33-48.
dc.identifier.doihttps://doi.org/10.15587/1729-4061.2023.281795
dc.identifier.orcidhttps://orcid.org/0000-0003-1647-6444
dc.identifier.orcidhttps://orcid.org/0000-0002-2015-8927
dc.identifier.orcidhttps://orcid.org/0000-0001-5087-7036
dc.identifier.orcidhttps://orcid.org/0000-0002-4120-0784
dc.identifier.orcidhttps://orcid.org/0000-0001-9833-9851
dc.identifier.orcidhttps://orcid.org/0000-0001-7245-7673
dc.identifier.orcidhttps://orcid.org/0000-0002-5169-8694
dc.identifier.orcidhttps://orcid.org/0009-0001-4003-8316
dc.identifier.orcidhttps://orcid.org/0000-0003-0584-7916
dc.identifier.orcidhttps://orcid.org/0000-0002-1179-7196
dc.identifier.urihttps://repository.kpi.kharkov.ua/handle/KhPI-Press/88520
dc.language.isoen
dc.publisherTechnology center PC
dc.subjectimproved SSL/TLS protocol
dc.subjectpost-quantum encryption algorithms
dc.subjectimproved UMAC algorithm
dc.subjectalgebraic geometric codes
dc.subjectflawed codes
dc.titleDevelopment of an improved SSL/TLS protocol using post-quantum algorithms
dc.typeArticle

Файли

Контейнер файлів

Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
EEJET_2023_3_9_Yevseiev_Development.pdf
Розмір:
371.53 KB
Формат:
Adobe Portable Document Format

Ліцензійна угода

Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
license.txt
Розмір:
1.71 KB
Формат:
Item-specific license agreed upon to submission
Опис: