A post-quantum public-key cryptographic system has been developed in the cryptography laboratory of the university (Novosibirsk). It is used in the Internet of things, blockchain technology, cryptocurrency, key exchange, for example, in instant messengers, or as an independent mean of protection. The cryptosystem is resistant to hacking, including a quantum computer through the use of NP-hard in a quantum sense problem. The university is looking for partners for furtherance on the Russian and international markets.
In order to enter the electronic document management system, arrange the service on the Internet, for example, on the website gosuslugi.ru, draw up documents on the Internet, in particular, the federal tax service nalog.ru, confirm a trading or banking operation, write a message in Telegram and in many other cases, the system is required to use certified encryption standards.
Unfortunately, these standards are hopelessly outdated. In 2010, a group of scientists from Japan, Europe, and the United States managed to successfully hack data hidden by a key of commonly used RSA standard, the length of which was 768 bits. Since December 31, 2013, Mozilla browsers have ceased to support certificates of certification centers with RSA keys less than 2048 bits. The enhanced development of quantum computers is bringing the post-quantum era closer, as reported in a 2016 report by the National Institute of Standard and Technology. Therefore, there is an urgent need to develop and use new quantum-stable encryption standards, since all current standards, based on the complexity of the problem of numbers factorization and discrete logarithm, will be hacked by the Shore algorithm.
At the University of Novosibirsk, on the basis of many years of fundamental research results of an employee and his experience in international IT companies, a new public key encryption algorithm was developed. It is based on the complexity of solving systems of polynomial equations in integers. Based on the specified mathematically sound scheme and technology, built upon and provided by it, a large amount of specific information from security systems such as encryption/decryption, public key (PKI), key exchange, security protocols, certification verification (CA) can be implemented.
The developed public key is based on NP-hard in the quantum sense algorithms. Their use allows one to guarantee resistance to quantum attacks, providing high-speed encryption and decryption of data. In addition, for the first time, developers have obtained probabilistic encryption for a post-quantum algorithm, which can be used within the framework of a cryptosystem, which further enhances its cryptographic strength.
The university is looking for partners for technology transfer through a commercial agreement with technical assistance, a license agreement, an agreement on the provision of services and others.
The novelty of the proposed technology lies in the development of such NP-hard in the quantum sense algorithms that provide resistance to hacking, with the help of computers including a quantum one, and high-speed operation of the algorithm.
The use of this algorithm allows customers to get significant benefits:
- Guarantee resistance to quantum attacks,
- Provide a high speed of document signing and signature verification, in particular, due to the speed of the algorithm, which is 315 times faster at the verification stage and 136 times – at the signing stage, in comparison with the working time of the free RSA implementation.
Current development status
There is a software implementation in the form of a software layout that can be used as a platform for demonstration of the capabilities of a public key. This layout clearly demonstrates the performance of the program and the quality of the results of the algorithm.
Intellectual property status
Other forms of protection
The development is protected by trade secrets.