THE POST-QUANTUM AND PUBLIC-KEY BLOCK CIPHER ALGORITHMS BASED ON C.E. SHANNON’S THEORY OF PERFECT SECRECY

Authors

  • Hong Dung Luu Le Quy Don Technical University
  • Phuong Trang Nong Le Quy Don Technical University

DOI:

https://doi.org/10.56651/lqdtu.jst.v13.n02.921.ict

Keywords:

Symmetric key cryptography, Encryption - Authentication algorithm, OTP cipher, block cipher, post-quantum cryptography, quantum-resistant cryptography

Abstract

The article proposes a post-quantum and public-key block cipher algorithms constructed based on C.E. Shannon’s theory of perfect secrecy. The post-quantum block cipher algorithm proposed here can resist various types of attacks assisted by quantum computers. In addition to high security, this algorithm also has the ability to authenticate the origin and integrity of the encrypted messages. The public key block cipher algorithms here are developed from the proposed post-quantum block cipher algorithm combined with the Diffie - Hellman protocol, so this algorithm can be used similarly to pre-quantum block cipher algorithms (DES, AES,...) but the establishment of the shared secret key is completely based on the public key infrastructure (PKI).

Downloads

Published

2024-12-27

Issue

Section

Articles

Most read articles by the same author(s)