<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Requirements and Security Models for Post-Quantum Cryptography Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kateryna Isirova</string-name>
          <email>KaterinaIsirova@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Potii</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Computer Science V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>4, Svobody Sqr, Kharkiv, 61022</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>36</fpage>
      <lpage>41</lpage>
      <abstract>
        <p>In the paper problems and risks for classical systems in the field of cryptographic protection of information in connection with the development of quantum computing are formulated. Problems the need to finding new solutions are grounded. The paper includes analysis of requirements of two major organizations NIST and ETSI. There are security models for cryptographic primitives offered in terms of post quantum cryptography.</p>
      </abstract>
      <kwd-group>
        <kwd>Post quantum cryptography</kwd>
        <kwd>Requirements for crypto algorithms in post quantum period</kwd>
        <kwd>NIST requirements</kwd>
        <kwd>ETSI requirements</kwd>
        <kwd>Security models for post quantum cryptography</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The progress in the field of quantum computing is an important challenge for modern
cryptography. The rapid evolution of quantum computers, and as a result the growth
of computational speed leads to the new risks for existing cryptographic systems. In
particular, Shor's algorithm and Grover search algorithm pose a real threat to the
asymmetric systems, based on RSA, Diffie-Hellman, Elliptic Curves [
        <xref ref-type="bibr" rid="ref1 ref3">1, 3</xref>
        ]. These
cryptosystems are used to implement digital signatures and key establishment and
play a crucial role in ensuring the confidentiality and authenticity of communications
on the Internet and other networks.
      </p>
      <p>In the near future the trust to the information systems that handle critical
information without any means of quantum-resistance cryptography will be impossible.</p>
      <p>On the way of building the new solutions it is important step to development and
formation characteristics and requirements that should be presented to new candidates
and possible conditions for their use.</p>
      <p>The paper includes analysis of requirements of two major organizations: NIST and
ETSI. There are models for security and cryptographic primitives offered in terms of
post quantum cryptography.</p>
    </sec>
    <sec id="sec-2">
      <title>A Brief Analysis of NIST Requirements</title>
      <p>
        NIST understands the need to find new primitives that will be relevant in the post
quantum period. Appropriate work carried out in the framework of an open
competition Post-Quantum crypto Project [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>The analysis showed that all requirements can be divided into the following groups:
1. The requirements of security, the main of which is the use of public key
cryptography, "semantically secure encryption" scheme, compliance with IND-CCA2 and
EUF-CMA security models; «Perfect forward secrecy», resistance to side-channel
attacks;
(a) parameter sets should meet or exceed each of five target security strengths:
(i) 128 bits classical security / 64 bits quantum security
(ii) 128 bits classical security / 80 bits quantum security
(iii) 192 bits classical security / 96 bits quantum security
(iv) 192 bits classical security / 128 bits quantum security
(v) 256 bits classical security / 128 bits quantum security
2. Technical and economic requirements, such as: focus on Internet protocols packets
size, hash key information, ensuring efficiency as the hardware and software
implementation, matching the size of the selected key system;
3. Technical and operational requirements: cross-platform, the possibility of
parallelization, understandability construction.
3</p>
    </sec>
    <sec id="sec-3">
      <title>A Brief Analysis of ETSI Requirements</title>
      <p>
        The European Union has also started the preparation of a new post quantum
standards. European Organization for Standardization ETSI in cluster "Security" formed a
new direction «Quantum-Safe Cryptography» [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>The major safety requirements defined by them include:
─ confidence in the associated security proof;
─ relevance of the security model;
─ the high difficulty of possible attacks;
─ potential to provide or enable multiple security features (e.g. associated key
establishment and authentication schemes);</p>
      <p>Ease of quantifying the claimed classical and quantum security levels;
─ certainty of the recommended key sizes for a given level of security (e.g. 80-bits,
112-bits, 128-bits or 256-bits);
─ practicality of key and signature sizes for transmission or storage across a range of
platforms, including resource-limited devices;
─ ease of integration into existing protocols or systems (e.g. is this drop-in
replacement?);
─ re-use of code base (e.g. to provide authentication as well as key establishment) ;
─ compatibility (e. g. flexibility in hash functions in schemes Merkle tree).</p>
    </sec>
    <sec id="sec-4">
      <title>Justification of Security Models for Post Quantum</title>
    </sec>
    <sec id="sec-5">
      <title>Cryptography</title>
      <p>
        Justification of resistance of cryptographic primitives should be based on complex
computational problems for quantum computers. Today the basic directions of
development of new quantum-safe or quantum-resistance algorithms are Hash-based
cryptography (HB-cryptography), Code-based cryptography (CB-cryptography),
Latticebased cryptography (LB-cryptography), Multivariate-quadratic-equations
cryptography (MQ-cryptography) [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ].
      </p>
      <p>Requirements of cryptographic strong should be formulated in accordance with the
following security models:
─ for encryption - in accordance with IND-CCA2 security model
(Indistinguishability under Adaptive Chosen Ciphertext Attack);
─ for digital signatures - in accordance with EUF-CMA model (Existentially
unforgeable under adaptive chosen message attacks).
4.1</p>
      <sec id="sec-5-1">
        <title>IND-CCA2 Security Model</title>
        <p>
          For probabilistic algorithm asymmetric encryption indistinguishability under
nonadaptive chosen ciphertext / adaptive chosen ciphertext attack (IND-CCA1 /
INDCCA2) is defined by the following game between the challenger (legitimate user) and
the adversary (cryptanalyst) [
          <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
          ].
        </p>
        <p>It is important to establish a definition:  ( ,  ) is encrypting message M under the
key PK.</p>
        <p>Additional condition is: the adversary is modeled by a probabilistic polynomial time
Turing machine, meaning that it must complete the game and output a guess within a
polynomial number of time steps.</p>
        <p>The adversary has access to the public key (encryption oracle, in the symmetric case),
as well as the adversary is given access to a decryption oracle which decrypts
arbitrary ciphertexts at the adversary's request, returning the plaintext.</p>
        <p>The Game consists of the following steps:
1. The challenger generates a key pair PK, SK based on some security
parameter k (e.g., a key size in bits), and publishes PK to the adversary. The challenger
retains SK.
2. The adversary may perform any number of encryptions, calls to the decryption
oracle based on arbitrary ciphertexts, or other operations.
3. Eventually, the adversary submits two distinct chosen plaintexts to the challenger.
4. The challenger selects a bit b ∈ {0, 1} uniformly at random, and sends the
"challenge" ciphertext C = E(SK, M) back to the adversary.
5. The adversary is free to perform any number of additional computations or
encryptions.
(a) In the non-adaptive case (IND-CCA1), the adversary may not make further
calls to the decryption oracle.
(b) In the adaptive case (IND-CCA2), the adversary may make further calls to the
decryption oracle, but may not submit the challenge ciphertext C.
6. Finally, the adversary outputs a guess for the value of b.</p>
        <p>A scheme is IND-CCA1/IND-CCA2 secure if no adversary has a non-negligible
advantage in winning the above game.
4.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>EUF-CMA Security Model</title>
        <p>
          A security notion (or level) is entirely defined by pairing an adversarial goal with an
adversarial model. Depending on the context in which a given signature scheme (or
cryptosystem) is used, one may formally define a security notion for the system [
          <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
          ].
─ By telling what goal an adversary would attempt to reach (the adversarial goal),
and
─ What means or information are made available to the attacker (the adversarial or
attack model).
        </p>
        <p>
          Some of the adversarial goals as well as adversarial models related to digital
signatures are briefly described [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>Adversarial Goals.</p>
        <p>Unbreakability: The attacker recovers the secret key sk from the public key pk (or an
equivalent key if any). This goal is denoted UB. It is implicitly appeared with
publickey signature scheme (or cryptography).</p>
        <p>Universal Unforgeability: The attacker, without necessarily having recovered sk,
can produce a valid signature s of any message m in the message space. It is noted
UUF.</p>
        <p>Existential Unforgeability: The attacker creates a message m and a valid signature
s of it (likely no control over the message). This is denoted EUF.</p>
        <p>Adversarial Models.</p>
        <p>Key-Only Attacks: The adversary only has access to the public key pk. This is
denoted KOA. This is an unavoidable scenario in public-key signature scheme (or
cryptography).</p>
        <p>Known Message Attacks: An adversary has access to signatures for a set of known
messages. It is noted KMA.</p>
        <p>Chosen Message Attacks: Here the adversary is allowed to use the signer as an
oracle (full access), and may request the signature of any message of his choice
(multiple requests of the same message are allowed). It is denoted CMA.</p>
        <p>Putting the adversarial goal on the y-axis and adversarial model on the x-axis, the
security notions are obtained. The intersecting points represent security notions. For
example, UB-KOA, UB-KMA, EUF-CMA etc are security notions. If there are u
adversarial goals and v adversarial models, there will be u * v security notions (Figure
1).
Let S = (K, S, V) be a signature scheme, and let Aeuf be a probabilistic polynomial time
algorithm. Consider the following attack scenario:
─ compute a key pair (sk, pk) $← K(1k), and hand pk as input to Aeuf;
─ the adversary Aeuf is given unrestricted access to a signing oracle OS to run Ssk(·);
─ eventually, Aeuf outputs a message M and a signature σ.</p>
        <p>
          Let QueriedEarlier be the event that Aeuf outputs a message M that has already been
queried to the signing oracle OS. The success probability SucceAeuf =SuccAeuf(k) of
Aeuf is defined as
Signature scheme S secure in the sense of EUF-CMA if SuccAeuf is negligible for all
probabilistic polynomial time adversaries Aeuf [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
5
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>The latest advances in technology of quantum computing form the new challenges for
modern cryptography and determine the need to find the new ways of ensuring
information security and its main properties - confidentiality, integrity, authentication and
repudiation.</p>
      <p>At present, there are several post-quantum cryptosystems that have been proposed,
including lattice-based cryptosystems, code-based cryptosystems, multivariate
cryptosystems, hash-based signatures, and others. However, for most of these proposals,
further research is needed in order to gain more confidence in their security
(particularly against adversaries with quantum computers) and to improve their performance.</p>
      <p>Should be understood the fact that a transition to post-quantum cryptography will
not be simple as there is unlikely to be a simple “drop-in” replacement for our current
public-key cryptographic algorithms. A significant effort will be required in order to
develop, standardize, and deploy new post-quantum cryptosystems. In addition, this
transition needs to take place well before any large-scale quantum computers are
built, so that any information that is later compromised by quantum cryptanalysis is
no longer sensitive when that compromise occurs.</p>
      <p>An important task for the deployment of research and development quantum-safe
algorithms is to determine the requirements for them. As a result of the analysis, we
can see that such requirements are derived in several groups, such as: the
requirements of security, technical and economic requirements .</p>
      <p>Requirements of cryptographic strong should be formulated in accordance with the
security models. According to the research we can conclude that such models
allowing the highest degree of adversary awareness</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>NISTIR</surname>
          </string-name>
          <article-title>8105 (DRAFT) Report on Post-Quantum Cryptography</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>NISTIR (DRAFT) Proposed</surname>
          </string-name>
          <article-title>Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <source>ETSI GR QSC 001 V.1.1.1</source>
          (
          <issue>2016</issue>
          -
          <fpage>07</fpage>
          ).
          <article-title>Quntum-Safe Cryptography (QSC); Quantum-safe algorithmic framework</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Lindell</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions</article-title>
          . In: Biham,
          <string-name>
            <surname>E. (ed.) EUROCRYPT</surname>
          </string-name>
          <year>2003</year>
          .
          <article-title>LNCS</article-title>
          , vol.
          <volume>2656</volume>
          , pp.
          <fpage>241</fpage>
          -
          <lpage>254</lpage>
          . Springer, Heidelberg (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Nojima</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Imai</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kobara</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morozov</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Semantic security for the mceliece cryptosystem without random oracles</article-title>
          .
          <source>Des. Codes Cryptography</source>
          <volume>49</volume>
          (
          <issue>1-3</issue>
          ),
          <fpage>289</fpage>
          -
          <lpage>305</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Faust</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiltz</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pietrzak</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothblum</surname>
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Leakage-Resilient</surname>
            <given-names>Signatures</given-names>
          </string-name>
          [Electronic resource] / S. Faust,
          <string-name>
            <given-names>E.</given-names>
            <surname>Kiltz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Pietrzak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Rothblum</surname>
          </string-name>
          .
          <source>Cryptology ePrint Archive</source>
          , 2009 Available at http://eprint.iacr.org/
          <year>2009</year>
          /282.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Muñiz</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steinwandt</surname>
            <given-names>R</given-names>
          </string-name>
          .
          <article-title>Security of signature schemes in the presence of key-dependent messages</article-title>
          .
          <source>Tatra Mountains Mathematical Publications</source>
          ,
          <year>2010</year>
          , vol.
          <volume>47</volume>
          , No. 3. Available at: https://www.sav.sk/journals/uploads/0317154702go-st.pdf
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>