Персона: Запечников, Сергей Владимирович
Загружается...
Email Address
Birth Date
Научные группы
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Запечников
Имя
Сергей Владимирович
Имя
6 results
Результаты поиска
Теперь показываю 1 - 6 из 6
- ПубликацияТолько метаданныеPost-quantum security of communication and messaging protocols: Achievements, challenges and new perspectives(2019) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович© 2019 IEEE Widely used communication and messaging protocols, e.g., TLS 1.3 and Signal, are insecure against an adversary with a quantum computer. We expect that post-quantum security will become mandatory for a new generation of cryptographic protocols in the nearest 10-15 years. The analysis of existing post-quantum secure cryptographic tools for key exchange, encryption and message authentication based on hard problems in codes, lattices, ring learning with errors and elliptic curve isogenies revealed their advantages and drawbacks. In particular, we conclude, that the main threat to communication and messaging protocols is only pre-quantum security of currently used Diffie-Hellman key exchange protocols. We summarize efficiency and safety results for each class of post-quantum cryptographic schemes and present an experimental implementation of isogeny-based Diffie-Hellman-like key exchange protocol as an illustration of their applicability.
- ПубликацияТолько метаданныеPost-Quantum Security of Messaging Protocols: Analysis of Double Ratcheting Algorithm(2020) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович© 2020 IEEE.Development in the area of quantum technologies led to the appearance of first quantum computers. The threat of using a quantum computer for cryptanalysis requires wide implementing post-quantum security in computing algorithms and communication protocols. We evaluate the computational power of some existing quantum computers to illustrate the relevance of research in post-quantum security. One of the best ways to test post-quantum protocols is to embed them into some non-critical but widely-used sphere. Secure messaging is an excellent example of such an application. In the paper, we analyze the post-quantum security of well-known messaging specification Signal, which is considered to have high-security properties. The core of Signal specification is the Double Ratchet protocol. We notice and explain why it is not a post-quantum secure scheme. After that, we suggest some possible ways to improve the security features of Signal specification.
- ПубликацияТолько метаданныеThe Relevance of Using Post-quantum Cryptography on the Isogenies of Elliptic Curves for Mobile Application Protection(2020) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович© 2020, Springer Nature Switzerland AG.The article is a brief overview of the relevance of using cryptographic protocols on isogenies of elliptic curves in mobile applications. The article briefly describes the current situation in the field of cryptography that has arisen in connection with the development of a new generation of computer technology, namely, quantum computers. The article describes the stages of standardization of post-quantum cryptography in accordance with the NIST competition. The article contains a comparison of post-quantum algorithms in terms of cryptographic stability and speed, defines of advantages and disadvantages of protocols on isogenies of elliptic curves, and results of studies on the implementation of the protocols on isogenies of elliptic curves on mobile platforms. The main goal of the article is to consider the possibility of using protocols on the isogeny of elliptic curves for practical purposes to protect confidential information in mobile systems and applications.
- ПубликацияТолько метаданныеPost-quantum Group Key Agreement Scheme(2021) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович© 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.Progress in quantum technologies forces the development of new cryptographic primitives that are resistant to attacks of an adversary with a quantum computer. A large number of key establishment schemes have been proposed for two participants, but the area of group post-quantum key establishment schemes has not been studied a lot. Not so long ago, an isogeny-based key agreement scheme was proposed for three participants, based on a gradual increase in the degree of the key. We propose another principle for establishing a key for a group of participants using a tree-structure. The proposed key establishment scheme for four participants uses isogeny of elliptic curves as a mathematical tool.
- ПубликацияОткрытый доступOn the key composition for post-quantum group messaging and file exchange(2021) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович© 2020 Elsevier B.V.. All rights reserved.Advances in the development of quantum technologies force to create new methods of secure information transfer over insecure networks and channels. In this article, we analyze some important properties of secure group messaging resilient to quantum computer attacks: message authentication and asynchronous key update. We consider options for ensuring message authentication and detect the difference between the requirements for this property in group communications and point-to-point channels. We define the structure of key information and preshared key packages for the new protocol based on the classic X3DH protocol.
- ПубликацияТолько метаданныеPost-quantum Secure Group Messaging(2021) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович© 2021 IEEE.Due to development in quantum computing, we need to create and implement new cryptographic protocols, which are resistant to attacks using a quantum computer, in all practical cases. Last years humans became using messengers to transfer far more important information than earlier, so it is necessary to create new post-quantum secure messaging protocols for peer-to-peer and group communications. In this article, we describe needed security properties, existing ways for the creation of group chats, and our suggestions. We described ways and needed primitives for the creation of a group key establishment scheme based on isogenies of elliptic curves. We describe such protocol as an extended Double Ratchet protocol.