Page 64 - ISCI’2017
P. 64

but  the  total number of  operations will  be reduced due  to  the  reduced dimension of  modules.

                                                     3
                                                             3
                                                        3
            Complexity of  transformation will  be  2 l =  3l and the values  in Table 1 correspond to  this
                                                     2
            assessment. The size of the module and the appropriate assessment of resistance (as the equivalent
            the length of a symmetric cipher key) was shown in the work [49]. Estimates of the volume of the
            quantum resources, which need to solve of some asymmetric cryptographic tasks with the help of

            Shor's algorithm at different parameters of these tasks, and a comparison of them with a complexity
            of sort out problem solution at searching of symmetric cipher key, were been presented in the work

                                                   3
            [50].  In particular, the assessment  4m   of time complexity of the quantum  factorization Shor's
            algorithm gives for m-bits number, and the volumes, which were shown in Table 1, correspond to this
            assessment.

                  Description of  block symmetric ciphers  AES (FIPS-197)  and  Kalyna  (DSTU  7624:2014)

            presents  in the works [44, 45].  Research  complexity of quantum  algorithms for  cryptanalysis of
            symmetric ciphers was performed in the work [51]. In particular, the quantum Grover’s algorithm for

            the solution of brute force problems, includes brute force searching of m-bits secret key of symmetric
                                           π
                                                m
            cipher, requires of execution of   2 iterations. In practice, this leads to a corresponding reduction
                                            4
            in resistance (twice the equivalent length of the key is reduced).
                  It should be noted to a high speed of crypto-transformation in the McEliece scheme, which

            approaching by encryption speed to block symmetric ciphers. Really, at using the Goppa code with

            recommended in the author’s manuscript [15] parameters
                                       n = 1024, k = 524, t = 50, d = 2t + 1 = 101,

            needs to execute no more than 524 XOR-operations per one processed word for an encryption by

            matrix method (calculation  IG + ). For example, one from the most fast modern block symmetric
                                              e
                                          X
            ciphers  AES (American Encryption Standard,  FIPS-197)  requires  to  encryption  no  less  4  XOR-
            operations to 32-bits word in each round [44] that at 10 rounds consists no less 40 XOR-operations.

                  The second important advantage of the McEliece scheme is a possibility to combine a crypto-
            transformation with errors resulting control. Really, if at the cryptogram forming (18) a random errors

            vector e and weights w(e)< t can be used, then will allow a possibility of a control errors within
            correcting capacity simultaneously with the cryptographic data conversion. Weight reducing of vector

            e decreases a cryptographic persistence of the McEliece scheme, but increases a data transmission
            noise immunity, i.e. changing the w(e) can adaptively respond to the need for appropriate security

            services in this “hybrid” scheme.

                  Let  us  denote  fraction of  weight vector error  of  the vector  e,  attributable to  the artificial
            introduction of the cryptogram formation (see to expression (18)) by the symbol ρ = w(e) / t. Then

            64
   59   60   61   62   63   64   65   66   67   68   69