Post-quantum algorithm "Rosehip" received an open implementation

Lord777

Professional
Messages
2,577
Reaction score
1,563
Points
113
Russian companies with expertise in cryptography and quantum technologies are joining forces to prevent threats to cryptographic systems from quantum computers.

Thus, the open implementation of the domestic post-quantum algorithm "Rosehip" of the company "Kryptonite" was prepared by the company "qApp" in the course of its activities as part of the working group "Post-Quantum cryptographic mechanisms" of the Technical Committee 26 of Rosstandart (TC 26). The project is written in C with optimization for the SSE4.1, SSE2, and MMX instruction sets. The source code is available on GitHub. It compiles to a library that can be embedded in industrial cryptographic devices and software products.

"The use of code optimization leads to a high speed of implementation of Rosehip. In tests on Intel Core i7-8700, the key pair generation took 3 ms, the signature of a single message took 848 milliseconds,and the signature verification took only 11 ms," explained Sergey Grebnev, cryptanalyst and head of the applied research group at qApp.

Rosehip is an electronic signature algorithm that is resistant to attacks using a quantum computer. It was developed by cryptographic experts from the Russian company Kryptonite, who participate in the TC 26 working group.

The Rosehip algorithm is based on a code-theoretic Stern identification protocol. The resistance of this signature scheme to forgery is based on the complexity of the problem of decoding a random linear code. Professor of Mathematics Alvin Berlekamp proved in 1978 that this problem belongs to the class of NP-hard problems. Effective algorithms for solving problems of this class are still unknown, either on a classical computer or on a quantum one.

According to Kryptonite, currently the best known attack using a classical computer on the Brier scheme will require 2 ^ 256 bit operations. That is, it cannot be completed in a reasonable amount of time on the fastest supercomputers. The theoretical resistance to a "quantum" attack is estimated at 2 ^ 170 operations, which also makes it impossible to perform it even on future quantum computers with billions of working qubits.

"I consider the publication of the software implementation of the Rosehip signature scheme to be a significant event in the international cryptographic community and an important milestone in the development of domestic post-quantum cryptography. It allows you to create reliable implementations of electronic signatures that are resistant to attacks using the most powerful supercomputers of traditional architecture and quantum computers that are still being developed," explained Vasily Shishkin, head of the cryptography laboratory at Kryptonite.

"If we follow the path of the traditional principle of counteraction: first the problem, and then the solution, then you can't build reliable information security solutions. In those early years, scientists took the path of developing protection without having a real threat. When mathematics and physics as sciences were at the origins of information security, the main foundation was laid in post-quantum cryptography and protection against attacks using quantum computers in the real absence of powerful computers. Today, when computing power performs the most complex operations in fractions of seconds, we see how the working group "Post-Quantum Cryptographic Mechanisms" consisting of leading specialists from Kryptonite and qApp, a resident of the Skolkovo Cyberhub, created an open implementation of the new post-quantum electronic signature algorithm "Rosehip". This algorithm will ensure the integrity and availability of information when transmitting over any distance and will be relevant for many years to come, " added Igor Biryukov, head of the Skolkovo Cyberhub.

The development of quantum computers today is carried out by the largest players in the IT industry. There are already existing prototypes that run specific algorithms faster than traditional supercomputers. Gartner analysts expect universal and commercially available quantum computers to be available by 2030. This carries risks for information security, since with a sufficiently powerful quantum computer, it will be possible to crack many cryptographic algorithms. All online services-from online stores to large government portals, as well as remote management systems-can become vulnerable. Working proactively, Kryptonite and qApp are consistently developing and standardizing post-quantum cryptographic mechanisms that will remain relevant even after the advent of quantum computers.

Direct link to the open implementation of the Rosehip algorithm on GitHub: https://github.com/QAPP-tech/shipovnik_tc26
 
Top