THE POST-QUANTUM AND PUBLIC-KEY BLOCK CIPHER ALGORITHMS BASED ON C.E. SHANNON’S THEORY OF PERFECT SECRECY
DOI:
https://doi.org/10.56651/lqdtu.jst.v13.n02.921.ictKeywords:
Symmetric key cryptography, Encryption - Authentication algorithm, OTP cipher, block cipher, post-quantum cryptography, quantum-resistant cryptographyAbstract
The article proposes a post-quantum and public-key block cipher algorithms constructed based on C.E. Shannon’s theory of perfect secrecy. The post-quantum block cipher algorithm proposed here can resist various types of attacks assisted by quantum computers. In addition to high security, this algorithm also has the ability to authenticate the origin and integrity of the encrypted messages. The public key block cipher algorithms here are developed from the proposed post-quantum block cipher algorithm combined with the Diffie - Hellman protocol, so this algorithm can be used similarly to pre-quantum block cipher algorithms (DES, AES,...) but the establishment of the shared secret key is completely based on the public key infrastructure (PKI).