=Paper=
{{Paper
|id=Vol-3829/short9
|storemode=property
|title=Classical and post-quantum encryption for GDPR (short paper)
|pdfUrl=https://ceur-ws.org/Vol-3829/short9.pdf
|volume=Vol-3829
|authors=Maksim Iavich,Oksana Kovalchuk,Sergiy Gnatyuk,Yuliia Khavikova,Volodymyr Sokolov
|dblpUrl=https://dblp.org/rec/conf/cqpc/IavichKGKS24
}}
==Classical and post-quantum encryption for GDPR (short paper)==
Classical and post-quantum encryption for GDPR⋆
Maksim Iavich1,†, Oksana Kovalchuk2,†, Sergiy Gnatyuk3,†, Yuliia Khavikova4,†
and Volodymyr Sokolov5,∗,†
1
Caucasus University, 1 Paata Saakadze str., 0102 Tbilisi, Georgia
2
Sokhumi State University, 61 Politkovskaya str., 0186 Tbilisi, Georgia
3
National Aviation University, 1 Liubomyra Huzara ave., 03058 Kyiv, Ukraine
4
State University of Trade and Economics, 19 Kyoto str., 02156 Kyiv, Ukraine
5
Borys Grinchenko Kyiv Metropolitan University, 18/2, Bulvarno-Kudriavska str., 04053 Kyiv, Ukraine
Abstract
In the dynamic digital landscape, the General Data Protection Regulation (GDPR) stands as a transformative
force, which aims to secure individual privacy and redefine organizational practices in personal data
handling. This paper analyzes the multifaceted layers of GDPR in detail, it elucidates its principles, rights
for data subjects, and obligations for data controllers and processors. The main attention is paid to
encryption standards, with specific recommendations for data protection in both classical and post-
quantum epochs. In the classical setting, the paper aims to employ AES-128 in data storage, striking a
balance between security and performance. For communication, the SSL protocol is used, with a caveat to
transition to TLS for contemporary applications. In the post-quantum epoch, where there will be fully-
fledged quantum computers, the paper proposes a shift to AES-256 for data storage and introduces
CRYSTALS-Kyber, an asymmetric cryptography algorithm secure against quantum attacks, for secure
communication. The recommendations emphasize the need for creating precise cryptographical
recommendations, particularly in the face of evolving threats. Compliance with GDPR and other data
protection regulations remains very important, ensuring the security and integrity of data in the 21st
century.
Keywords
GDPR, AES-256, encryption, post-quantum cryptography, cryptographical application1
1. Introduction As we study GDPR, it becomes evident that this
regulation is not a legal framework but a catalyst for an
Because of the rapid evolution of digital technologies, important organizational shift towards a more privacy-
the security of data has become very important [1, 2]. As oriented approach. By understanding the nuances and
people have to share their personal information online, implications of the GDPR, businesses, policymakers, and
concerns about data privacy and security have become individuals can actively contribute to the responsible
impor-tant. In response to these concerns, the Euro-pean and ethical use of personal data in the digital era [6–8].
Union (EU) has elaborated the General Data Protection This paper studies the multifaceted layers of the
Regulation (GDPR), a land-mark legislation designed to GDPR, providing a comprehensive of these layers.
secure the rights and privacy of individuals in the digital Through this exploration, we aim to foster a deeper
realm. understanding of the GDPR’s significance, its impact on
The GDPR, which came into effect on May 25, 2018, various stakeholders, and the evolving landscape of data
represents a paradigm shift in data protection, protection in the 21st century. The main aim of the paper
emphasizing transparency, accountability, and is to analyze the encryption standards for data
individual empowerment. Its main goal is to provide protection. Based on the analysis the goal of the paper is
individuals with greater control over their data while to offer a detailed recommendation for data encryption
imposing strict rules on organizations that process such in ongoing and post-quantum epochs.
information. Because of the importance of GDPR, this
paper aims to analyze the regulatory framework, 2. GDPR layers
exploring its fundamental principles, the rights it affords
to data subjects and the obligations it places upon data Let’s mention analyze the various layers of the GDPR
controllers and processors [3–5]. and their implications:
CQPC-2024: Classic, Quantum, and Post-Quantum Cryptography, August 0000-0002-3109-7971 (M. Iavich); 0000-0002-2354-6545
6, 2024, Kyiv, Ukraine (O. Kovalchuk); 0000-0003-4992-0564 (S. Gnatyuk); 0000-0003-1017-3602
∗ Corresponding author. (Y. Khavikova); 0000-0002-9349-7946 (V. Sokolov)
†
These authors contributed equally.
© 2024 Copyright for this paper by its authors. Use permitted under
miavich@cu.edu.ge (M. Iavich); oksana.kovalchuk@gmail.com Creative Commons License Attribution 4.0 International (CC BY 4.0).
(O. Kovalchuk); s.gnatyuk@nau.edu.ua (S. Gnatyuk);
pirogova0303@gmail.com (Y. Khavikova); v.sokolov@kubg.edu.ua
(V. Sokolov)
CEUR
Workshop
ceur-ws.org
ISSN 1613-0073
70
Proceedings
2.1. Principles 2.6. Data processing records
Lawfulness, Fairness, and Transparency: This principle Maintaining records of data processing activities
ensures that organizations process personal data legally promotes transparency and accountability. It helps
and transparently. It emphasizes the importance of organizations keep track of their data processing
informing individuals about the processing activities practices and facilitates cooperation with data
and the reasons behind them, fostering trust and protection authorities during audits.
accountability.
Purpose Limitation and Data Minimization: These 2.7. Data protection impact assessments
principles emphasize the need for organizations to clearly
Data Protection Impact Assessments (DPIAs) are a
define the purposes for which they collect data and to
proactive tool for identifying and mitigating potential
collect only the minimum necessary data for those
risks associated with data processing activities. This
purposes. This helps prevent the indiscriminate collection
encourages organizations to assess and address privacy
and processing of personal information.
risks before initiating certain processing operations,
Accuracy and Storage Limitation: These principles
aligning with a risk-based approach to data protection.
highlight the importance of maintaining accurate and
up-to-date data and ensuring that personal data is not 2.8. Cross-border data transfers
stored longer than necessary. This promotes data quality
and relevance. The restrictions on cross-border data transfers ensure
Integrity and Confidentiality: Organizations must that personal data leaving the EU enjoys an adequate
implement security measures to protect personal data level of protection. This protects the privacy rights of
from unauthorized access, disclosure, alteration, and individuals, even when their data is transferred
destruction, ensuring the integrity and confidentiality of internationally.
the data.
2.9. Data breach notification
2.2. Data subject rights The mandatory reporting of data breaches within 72
The recognition of robust data subject rights empowers hours enhances transparency and enables swift action to
individuals to have control over their data. This includes mitigate potential harm. This requirement emphasizes
the right to access their information, rectify inaccuracies, the importance of timely and effective responses to
and even request the deletion of their data under certain security incidents.
circumstances. These rights enhance individual
autonomy and privacy. 2.10. Accountability and governance
The principles of accountability and governance require
2.3. 3. Lawful basis for processing organizations to take responsibility for their data
Requiring a lawful basis for processing ensures that processing activities. This involves adopting internal
organizations have a legitimate reason for collecting and policies, conducting training, and maintaining
processing personal data. This prevents arbitrary or documentation, fostering a culture of compliance and
unjustified processing and encourages responsible data transparency.
management. As we can see, the layers of GDPR collectively create
an interesting and important framework that prioritizes
2.4. Consent the rights and privacy of individuals, fosters
transparency, and promotes responsible data
The GDPR introduces a higher standard for obtaining
governance across organizations. Compliance with
and managing consent. It ensures that individuals are
these layers not only ensures legal adherence but also
fully informed and have given clear affirmative action,
contributes to a more ethical and trustworthy data
fostering a more transparent and ethically grounded
ecosystem.
approach to data processing.
2.5. Data protection officer 3. Encryption in GDPR
The appointment of a Data Protection Officer (DPO) is a The GDPR does not explicitly mandate the use of
proactive step toward ensuring that organizations have specific security technologies like data encryption.
a designated person responsible for overseeing data However, GDPR does require organizations to
protection compliance. This demonstrates a implement appropriate technical and organizational
commitment to accountability and effective governance. measures to ensure a level of security appropriate to the
risk. Encryption is recognized as one of the security
71
measures that can help protect personal data, and it is algorithm that plays a crucial role in securing data,
explicitly mentioned in several articles of the regulation. including its storage. AES was established as a standard
Here are the four most relevant aspects of GDPR related by the National Institute of Standards and Technology
to data encryption: (NIST) in 2001, replacing the Data Encryption Standard
1. Security of Processing (Article 32): (DES). AES is known for its efficiency, security, and
Article 32 of the GDPR outlines the security of versatility, making it a popular choice for encrypting
processing requirements. It states that controllers and sensitive information.
processors must implement appropriate technical and Here are key aspects of using AES as a method for
organizational measures to ensure a level of security storing data [9]:
appropriate to the risk. This includes the AES is a symmetric encryption algorithm, meaning
pseudonymization and encryption of personal data. the same key is used for both encryption and decryption.
2. Pseudonymization (Recital 78): This simplicity in key management makes AES efficient
Recital 78 of the GDPR specifically mentions for storing and retrieving encrypted data. AES supports
pseudonymization as a security measure. key lengths of 128, 192, and 256 bits. Longer key lengths
Pseudonymization is a process that involves replacing or generally provide stronger security, but they may
encrypting personal data in a way that prevents require more computational resources. The choice of
attributing it to a specific data subject without additional key length depends on the desired level of security and
information. the specific implementation.
3. Notification of a Personal Data Breach to the AES operates as a block cipher, encrypting data in
Supervisory Authority (Article 33): fixed-size blocks. The standard block size for AES is 128
In the event of a personal data breach, Article 33 bits. Each block undergoes multiple rounds of
requires the data controller to notify the supervisory encryption and transformation, contributing to the
authority without undue delay, unless the breach is algorithm’s security.
unlikely to result in a risk to the rights and freedoms of AES can be used in various modes of operation, such
individuals. Encryption is mentioned as a measure to as Electronic Codebook (ECB), Cipher Block Chaining
mitigate the risks associated with a data breach. (CBC), Counter (CTR), and others. The mode of
4. Communication of a Personal Data Breach to the operation determines how the algorithm encrypts data
Data Subject (Article 34): blocks and adds a layer of complexity and security.
Article 34 states that, in certain cases, the data The cryptosystem is commonly employed for data-
controller is required to communicate the personal data at-rest encryption, securing data stored on devices such
breach to the data subject without undue delay. as hard drives, SSDs, and other storage media.
However, this communication is not necessary if the Encrypting data at rest helps protect sensitive
data is unintelligible due to encryption or other security information from unauthorized access, especially in the
measures. event of physical theft or data breaches.
In summary, while GDPR doesn’t explicitly mandate AES is often used to meet various security and
data encryption, it strongly encourages its use as part of compliance standards, including those related to data
a broader set of security measures. The implementation protection and privacy. Its acceptance as a secure
of encryption, especially when combined with other encryption algorithm by international organizations and
security practices like pseudo-nymization, helps regulatory bodies makes it a suitable choice for
organizations meet the GDPR’s requirements for organizations handling sensitive data.
securing personal data and mitigating the risks AES encryption can be also integrated into various
associated with data breaches. Organizations should storage systems, including databases and file systems.
assess the risks associated with their data processing This integration allows organizations to encrypt data at
activities and implement security measures, including the storage level, providing an additional layer of
encryption, based on the principle of proportionality. protection beyond application-level encryption.
The cryptosystem is designed to be computationally
4. Problem statement and solution efficient, but the performance impact of encryption can
vary based on factors such as key length, mode of
As we can see GDPR does not explicitly mandate data operation, and the hardware used. Modern processors
encryption. Without the recommendation of concrete often include hardware acceleration for AES, optimizing
encryption standards, it is complicated for organizations performance.
to choose the needed standards. It can lead to security IT must be mentioned, that effective key
breaches. For the local data storage, we can use management is crucial when using AES. Safeguarding
symmetric encryption. encryption keys is essential to maintaining the security
AES, which stands for Advanced Encryption
Standard, is a widely used symmetric encryption
72
of encrypted data. Organizations should implement practice to ensure the secure transmission of data, and it
secure key storage and distribution practices. aligns well with GDPR requirements for protecting
Choosing Advanced Encryption Standard (AES) for personal data during transit [10]. Here’s an overview of
GDPR Compliance in the realm of General Data how SSL/TLS can be considered as an encryption
Protection Regulation (GDPR) compliance, the selection standard for GDPR compliance:
of a robust encryption standard is obligatory for SSL/TLS protocols are designed to provide a secure
securing personal data. As we mentioned above it stands channel for data transmission over the internet. This is
out as a highly secure and good choice that aligns with achieved through encryption, which protects the
GDPR principles. AES, a symmetric encryption confidentiality and integrity of the data being
algorithm, has earned its reputation for security through transferred between a user’s browser and a web server.
rigorous cryptographic analysis. Its implementation GDPR emphasizes the principles of data protection,
provides sufficient protection for sensitive information, including the need to process personal data securely.
addressing the GDPR’s mandate for robust data Using SSL/TLS for data transfer helps organizations
protection. Especially well-suited for encrypting stored comply with these principles by ensuring that sensitive
information, AES’s symmetric nature ensures efficient information is encrypted during transmission,
and effective encryption, meeting GDPR’s emphasis on preventing unauthorized access or interception.
securing data at rest. This approach guarantees that SSL/TLS protocols use strong encryption algorithms
personal data remains confidential and protected from to secure data. The choice of encryption algorithms and
unauthorized access. The cryptosystem aligns key lengths in the configuration of SSL/TLS can be
seamlessly with GDPR principles, including data aligned with GDPR’s emphasis on adopting appropriate
minimization, integrity, and confidentiality. By technical measures to protect personal data.
employing AES for data encryption, organizations GDPR grants individuals the right to have their data
adhere to GDPR’s mandate to store and manage only processed securely. By implementing SSL/TLS,
necessary information while maintaining data integrity organizations contribute to the protection of data
and confidentiality through encryption. In the subject rights, especially during data transfer processes
unfortunate event of a data breach, GDPR necessitates where the risk of interception is higher.
prompt notification to the supervisory authority and, in SSL/TLS contributes to secure communication
certain cases, to data subjects. The cryptosystem plays between data subjects and data controllers. When
an important role in breach mitigation by rendering the obtaining consent or communicating with individuals
encrypted data unreadable without the proper regarding their data, the use of encrypted channels helps
decryption key, reducing the risk of harm to individuals. maintain the confidentiality and integrity of the
GDPR encourages the use of pseudonymization as an information exchanged.
additional security measure. AES, integrated into a The protocol not only encrypts data but also
broader pseudonymization strategy, adds an extra layer provides a mechanism for server authentication.
of complexity, making it challenging to associate Verifying the identity of the server helps prevent man-
encrypted data with specific individuals without the in-the-middle attacks, ensuring that data is transmitted
requisite decryption keys. Widely adopted across to and from legitimate sources.
industries, AES’s versatility allows for seamless In the event of a personal data breach, GDPR
integration into various systems, databases, and storage mandates timely notification. The use of SSL/TLS can
solutions. Its international recognition contributes to a mitigate the risk of data breaches during transmission,
consistent and effective approach to data encryption, reducing the likelihood of unauthorized access and the
aligning with GDPR’s emphasis on protecting personal need for such notifications.
data regardless of geographical boundaries. The protocol is considered a standard and best
Therefore, selecting AES as the encryption standard practice for securing data in transit. Its widespread
for GDPR compliance reflects a commitment to the adoption across the internet and acceptance as a secure
secure processing and storage of personal data. While communication protocol contribute to its alignment
encryption is a crucial aspect of GDPR compliance, with industry standards, reinforcing its suitability for
organizations should adopt a holistic approach, GDPR compliance.
considering additional technical and organizational It’s important to note that while SSL/TLS is crucial
measures to ensure comprehensive data protection. The for securing data in transit, a comprehensive GDPR
key size can be chosen as a 128-bit length. compliance strategy should encompass other security
For communication encryption, we offer to use measures, including encryption at rest, access controls,
asymmetric encryption. Using SSL (Secure Sockets and secure data processing practices. Additionally,
Layer) or its successor, TLS (Transport Layer Security), organizations should stay informed about evolving
for data transfer is a common and recommended
73
encryption standards and vulnerabilities to ensure the 6. Solution for post-quantum
ongoing effectiveness of their security measures.
epoch
5. Secure encryption under GDPR Grover’s algorithm is a quantum algorithm that
addresses the problem of unstructured search, and it has
5.1. Encryption as a security measure implications for symmetric-key cryptography, including
Article 32 of the GDPR explicitly mentions encryption algorithms like AES. Grover’s algorithm offers a
as a security measure that organizations should consider quadratic speedup for unstructured search problems
to protect personal data. Encryption helps ensure the [11].
confidentiality, integrity, and availability of data by In the context of symmetric-key cryptography,
making it unreadable to unauthorized parties. Grover’s algorithm can be used to search an unsorted
While encryption is not mandatory, it is strongly database or find the key for a symmetric encryption
recommended, especially for protecting sensitive data. algorithm. Grover’s algorithm implies that the time
The GDPR promotes a risk-based approach, where complexity of a brute-force search is reduced from O(2n)
encryption is one of the methods to mitigate risks to to O(2n/2), where “n” is the key length. This means that
personal data. the security strength provided by a key length of “n” bits
against a brute-force search is halved when subjected to
5.2. Data breach notification Grover’s algorithm.
For example, if you have a symmetric key with a
Under Article 34, if a data breach occurs and the personal
length of 128 bits, classically it would take an exhaustive
data is encrypted, the breach is less likely to pose a high
search of 2128 operations to find the key. With Grover’s
risk to the rights and freedoms of individuals. As a
algorithm, the time complexity is reduced to the square
result, if the data is properly encrypted, organizations
root of 2128, which is 264 operations. Therefore, the
might not need to notify the affected individuals,
effective security strength is reduced to 64 bits against a
provided the encryption is robust and the decryption
quantum search. To maintain a certain level of security
key has not been compromised.
against quantum attacks, it’s generally recommended to
use longer key lengths with symmetric key algorithms.
5.3. Data protection by design and by For instance, if you were aiming for 128-bit security
default against a quantum attack, you might use a key length of
Article 25 encourages organizations to implement 256 bits with a symmetric algorithm like AES.
appropriate technical and organizational measures, such Therefore, we offer to use the key length of 256 bits
as encryption, from the outset of data processing for AES to securely store data.
activities. This concept, known as “data protection by For communication asymmetric cryptography must
design and by default”, aims to integrate privacy be involved. Quantum computers can break the existing
features directly into the processing systems and asymmetric cryptography using Shor’s algorithm [12].
services. Shor’s algorithm is a quantum algorithm designed to
efficiently factorize large numbers and compute discrete
5.4. Pseudonymization logarithms, which poses a significant risk to widely used
encryption methods like RSA and ECC. In particular,
Encryption is often used as a tool for pseudonymization,
RSA’s security, dependent on the difficulty of factoring
a process mentioned in GDPR that reduces the risks to
large numbers, and ECC, relying on the elliptic curve
data subjects. Pseudonymization involves processing
discrete logarithm problem, are compromised by Shor’s
personal data in such a manner that it cannot be
algorithm on a sufficiently powerful quantum computer
attributed to a specific individual without additional
[13, 14].
information, which must be kept separately and
On a different front, Grover’s algorithm, a quantum
securely.
search algorithm, has implications for symmetric
encryption and impacts the effective key length. While
5.5. Impact on data processing not directly breaking public-key cryptography, Grover’s
When data is encrypted, it may affect how it can be algorithm provides a quadratic speedup for unstructured
processed. For instance, encrypted data typically cannot search problems, effectively halving the security
be searched or analyzed in its encrypted form, which provided by symmetric encryption key lengths. This
may necessitate the development of secure and efficient prompts the need for longer key lengths in symmetric
decryption processes within an organization. encryption to maintain equivalent security levels in the
face of quantum threats [15–17].
74
To counter these quantum risks, ongoing efforts in post- conventional computers, quantum computers could
quantum cryptography are focused on developing rapidly solve math problems currently deemed
encryption algorithms resistant to quantum attacks. intractable, rendering existing encryption systems
Researchers are exploring alternative mathematical vulnerable. The selected quantum-resistant algorithms,
problems and cryptographic techniques to ensure the designed for general encryption and digital signatures,
continued security of digital communication in a rely on math problems that both conventional and
quantum computing era. quantum computers should find challenging to solve.
Therefore, for asymmetric encryption, we offer to The chosen algorithm for general encryption is
use already existing NIST standards. GAITHERSBURG, CRYSTALS-Kyber, recognized for its smaller encryption
Md.—The National Institute of Standards and keys facilitating easy exchange between parties and
Technology (NIST), part of the U.S. Department of operational speed [19–24].
Commerce, has taken a significant step in addressing the Therefore, we offer to use CRYSTALS-Kyber as
potential threat posed by future quantum computers to asymmetric encryption.
digital security. NIST has unveiled the initial group of
encryption tools designed to withstand quantum 7. Final recommendations for
computer attacks, which could jeopardize the privacy of
information crucial to daily digital activities such as
NIST encryption standards
online banking and email communication. These Classical setting:
selected encryption algorithms are anticipated to be part 1. Data Storage (AES-128):
of NIST’s forthcoming post-quantum cryptographic Using AES-128 for data storage is a common and
standard, expected to be finalized within approximately secure practice. It provides a good balance between
two years. security and performance in most scenarios.
Gina M. Raimondo, the Secretary of Commerce, 2. Communication (SSL Protocol):
emphasized the importance of this announcement as a SSL (Secure Sockets Layer) has been widely used for
milestone in fortifying sensitive data against potential securing communication over the internet. Note that the
cyber threats from quantum computers. NIST has played latest version of SSL is TLS (Transport Layer Security),
a crucial role in managing a six-year effort that began in and it’s recommended to use TLS instead for modern
2016, urging cryptographers globally to create and vet applications [24–26].
encryption methods capable of resisting attacks from Post-Quantum Epoch:
more powerful quantum computers. The unveiling of Data Storage (AES-256):
these encryption algorithms marks a pivotal stage in In a post-quantum epoch, where quantum
NIST’s post-quantum cryptography [18] standardization computers may pose a threat to certain cryptographic
project. algorithms, it’s prudent to use a higher key size for
Under Secretary of Commerce for Standards and encryption. AES-256 provides stronger security
Technology and NIST Director Laurie E. Locascio compared to AES-128 and is considered more resilient to
highlighted NIST’s forward-looking approach to potential quantum attacks.
anticipate the needs of U.S. industry and society. The Communication (Asymmetric Cryptography—
agency’s post-quantum cryptography program, drawing CRYSTALS-Kyber):
on top cryptography experts worldwide, has produced In a post-quantum era, asymmetric algorithms may
the first set of quantum-resistant algorithms aimed at become vulnerable to attacks by quantum computers. As
establishing a standard to significantly enhance digital a result, using asymmetric cryptography that is
information security. This initial selection includes four considered quantum-resistant becomes essential.
encryption algorithms designed to resist quantum CRYSTALS-Kyber is a post-quantum key exchange
attacks. Four additional algorithms are currently under algorithm, and choosing it for communication aligns
consideration, with the finalists expected to be with the goal of future-proofing against quantum
announced in the future. The decision to reveal choices threats.
in two stages is driven by the necessity for a diverse It’s important to stay informed about the latest
range of defense tools. Different systems and tasks developments in cryptography and regularly update
utilizing encryption demand tailored solutions, diverse cryptographic protocols and algorithms to maintain the
approaches, and multiple algorithms to address potential security of data in changing threat landscapes.
vulnerabilities. Additionally, compliance with relevant data protection
It must be mentioned that encryption is a regulations, such as GDPR, should always be considered
fundamental mechanism that employs mathematical in cryptographic decisions [27–30].
principles to safeguard electronic information and faces The pseudo-code for the usage of the offered
a potential challenge from quantum computers. Unlike technologies can look as follows:
75
# Import necessary cryptographic libraries encryptor = cipher.encryptor()
from cryptography.hazmat.primitives.ciphers import encrypted_data = encryptor.update(data) +
Cipher, algorithms, and modes encryptor.finalize()
from cryptography.hazmat.backends import return encrypted_data
default_backend
from crystals_kyber import kyber # Function to perform secure communication in a
classical setting
# Function to generate AES key based on epoch def secure_communication_classical(data):
def generate_aes_key(epoch): # Implement TLS/SSL with RSA or ECC
if epoch == "classical": pass
return generate_aes_key_classical()
elif epoch == "post_quantum": # Function to perform secure communication with post-
return generate_aes_key_post_quantum() quantum epoch
else: def secure_communication_post_quantum(data):
raise ValueError("Invalid epoch specified") # Implement CRYSTALS-Kyber for key exchange
pass
# Function to generate AES-256 key for classical setting
def generate_aes_key_classical(): # Example usage:
# Implement the key generation for the classical plaintext_data = "Sensitive data to be encrypted."
setting epoch = "post_quantum" # Change this to "classical" for
pass the classical setting
usage = "communication" # Change this to "storage" for
# Function to generate AES-256 key for post-quantum data storage
epoch
def generate_aes_key_post_quantum(): # Encryption based on the specified epoch and usage
# Implement the key generation for the post-quantum encrypted_data = encrypt_data(plaintext_data, epoch,
epoch usage)
pass
# Now, encrypted_data can be stored or transmitted
# Function to encrypt data based on epoch and usage securely.
def encrypt_data(data, epoch, usage):
if epoch == "classical": 8. Conclusions and future plans
if usage == "storage": Cryptography is an essential tool for GDPR compliance,
return encrypt_data_aes(data, providing the means to protect personal data effectively.
generate_aes_key_classical()) By implementing strong cryptographic measures,
elif usage == "communication": organizations can significantly reduce the risk of data
return secure_communication_classical(data) breaches and ensure that they meet the stringent
else: requirements of the GDPR. The best practices for Using
raise ValueError("Invalid usage specified") Cryptography under GDPR are the following:
elif epoch == "post_quantum":
if usage == "storage": Key Management: Proper management of
return encrypt_data_aes(data, encryption keys is critical to ensuring that
generate_aes_key_post_quantum()) encrypted data remains secure. Keys must be
elif usage == "communication": stored and managed securely to prevent
return unauthorized access.
secure_communication_post_quantum(data) Regular Audits and Updates: Cryptographic
else: algorithms and their implementations should
raise ValueError("Invalid usage specified") be regularly audited and updated to protect
else: against emerging threats.
raise ValueError("Invalid epoch specified") Compliance with Standards: Use cryptographic
methods that comply with recognized
# Function to encrypt data using AES-256 standards, such as those from the NIST or the
def encrypt_data_aes(data, key): European Telecommunications Standards
cipher = Cipher(algorithms.AES(key), modes.ECB(), Institute (ETSI).
backend=default_backend())
76
In conclusion, our cryptographic recommendations aim Systems of Situational Center, in: Emerging
to establish a robust and adaptable security foundation Technology Trends on the Smart Industry and the
for our system. For data storage in the classical epoch, Internet of Things, vol. 3149 (2022) 107–117.
we offer to use of AES-128, a widely recognized and [6] H. Li, Yu L., H. Wu, The Impact of GDPR on Global
efficient symmetric encryption algorithm. This choice Technology Development, J. Global Inf. Technol.
strikes a balance between security and computational Manag. 22(1) (2019) 1–6. doi: 10.1080/
efficiency, making it suitable for protecting stored data 1097198X.2019.156 9186.
in various scenarios. [7] C. Tankard, What the GDPR Means for Businesses,
For secure communication, we recommend the use Netw. Secur. 2016(6) (2016) 5–8. doi:
of SSL/TLS protocols, incorporating modern cipher 10.1016/S1353-4858(16)300 56-3.
suites such as those based on AES in combination with [8] G. Johnson, S. Shriver, S. Goldberg, Privacy and
RSA or ECC for key exchange. SSL ensures the Market Concentration: Intended and Unintended
confidentiality and integrity of data during Consequences of the GDPR, Manag. Sci. 69(10)
transmission, and our approach aligns with current best (2023) 5695–6415. doi: 10.1287/mnsc.2023. 4709.
practices for secure communication. [9] J. Daemen, V. Rijmen, AES Proposal: Rijndael
In anticipation of future challenges posed by quantum (1999).
computing, our transition to post-quantum algorithms is [10] D. Wagner, B. Schneier, Analysis of the SSL 3.0
exemplified by the adoption of CRYSTALS-Kyber for Protocol, The Second USENIX Workshop on
secure communication. This step reflects our commitment Electronic Commerce Proceedings 1(1) (1996).
to staying ahead of emerging threats and safeguarding [11] R. Jozsa, Searching in Grover’s Algorithm (1999).
sensitive information. doi: 10.48550/arXiv.quant-ph/9901021.
In our future research, we think of offering the post- [12] T. Monz, et al., Realization of a Scalable Shor
quantum model for SSL. Algorithm, Science 351(6277) (2016) 1068–1070.
doi: 10.1126/scien ce.aad9480.
Acknowledgment [13] H. Wong, Shor’s Algorithm, Introduction to
Quantum Computing: From a Layperson to a
This work was funded by the Shota Rustaveli National Programmer in 30 Steps. Cham: Springer
Foundation of Georgia (SRNSFG) (NFR-22-14060). International Publishing (2023) 289–298.
[14] A. M. Patoary, et al., Chaotic Roots of the Modular
References Multiplication Dynamical System in Shor’s
[1] F. Kipchuk, et al., Assessing Approaches of IT Algorithm (2023). doi: 10.48550/arXiv.2306.16446.
Infrastructure Audit, in: IEEE 8th International [15] Z. Hu, et al., High-Speed and Secure PRNG for
Conference on Problems of Infocommunications, Cryptographic Applications, Int. J. Comput.
Science and Technology (2021) 213–217. doi: Network Inf. Secur. 12(3) (2020) 1–10. doi:
10.1109/picst54195.2021.9772181. 10.5815/ijcnis.2020. 03.01.
[2] V. Buriachok, V. Sokolov, P. Skladannyi, Security [16] M. Iavich, et al., Lattice based Merkle, in:
Rating Metrics for Distributed Wireless Systems, International Conference on Information
in: 8th International Conference on “Mathematics. Technologies, vol. 2470 (2019) 13–16.
Informa-tion Technologies. Education:” Modern [17] S. Tynymbayev, et al., Modular Reduction Based
Machine Learning Technologies and Data Science, on the Divider by Blocking Negative Remainders,
vol. 2386 (2019) 222–233. News of the National Academy of Sciences of the
[3] P. Anakhov, et al., Protecting Objects of Critical Republic of Kazakhstan, Series of Geology and
Information Infrastructure from Wartime Cyber Technical Sciences 2(434) (2019) 238–248. doi:
Attacks by Decentralizing the Telecom- 10.32014/2019.2518-170x.60.
munications Network, in: Cybersecurity Providing [18] A. Bessalov, et al., Multifunctional CRS Encryption
in Information and Telecommunication Systems, Scheme on Isogenies of Non-Supersingular
vol. 3550 (2023) 240–245. Edwards Curves, in: Workshop on Classic,
[4] P. Anakhov, et al., Increasing the Functional Quantum, and Post-Quantum Cryptography, vol.
Network Stability in the Depression Zone of the 3504 (2023) 12–25.
Hydroelectric Power Station Reservoir, in: [19] M. Iavich, T. Kuchukhidze, R. Bocu, A Post-
Emerging Technology Trends on the Smart Quantum Digital Signature Using Verkle Trees
Industry and the Internet of Things, vol. 3149 and Lattices, Symmetry 15(12) (2023) 2165.
(2022) 169–176. [20] M. Iavich, T. Kuchukhidze, Digital Signature
[5] V. Grechaninov, et al., Formation of Dependability Design Using Verkle Tree (2023).
and Cyber Protection Model in Information
77
[21] E. Dubrova, et al., Breaking a Fifth-order Masked
Implementation of Crystals-kyber by Copy-paste,
Proceedings of the 10th ACM Asia Public-Key
Cryptography Workshop (2023).
[22] R. Avanzi, et al., CRYSTALS-Kyber Algorithm
Specifications and Supporting Documentation,
NIST PQC Round 2(4) (2019) 1–43.
[23] M. Moraitis, et al., Securing CRYSTALS-Kyber in
FPGA Using Duplication and Clock
Randomization, IEEE Design & Test (2023).
[24] S. Gnatyuk, et al., New Secure Block Cipher for
Critical Applications: Design, Implementation,
Speed and Security Analysis, Advances in
Intelligent Systems and Computing (2020) 93–104.
[25] A. Bessalov, et al., Modeling CSIKE Algorithm on
Non-Cyclic Edwards Curves, in: Cybersecurity
Providing in Information and Telecommunication
Systems, vol. 3288 (2022) 1–10.
[26] S. Gnatyuk, et al., Method of Algorithm Building
for Modular Reducing by Irreducible Polynomial,
16th International Conference on Control,
Automation and Systems (2016) 1476–1479. doi:
10.1109/iccas.2016.7832498.
[27] A. Bessalov, et al., Implementation of the CSIDH
Algorithm Model on Supersingular Twisted and
Quadratic Edwards Curves, in: Workshop on
Cybersecurity Providing in Information and
Telecommunication Systems, vol. 3187(1) (2022)
302–309.
[28] C. Papamanthou, et al., Streaming Authenticated
Data Structures, Advances in Cryptology—
EUROCRYPT (2013) 353–370. doi: 10.1007/978-3-
642-38348-9_22.
[29] A. Bessalov, et al., CSIKE-ENC Combined
Encryption Scheme with Optimized Degrees of
Isogeny Distribution, in: Workshop on
Cybersecurity Providing in Information and
Telecommunication Systems, vol. 3421 (2023) 36–
45.
[30] I. Khaburzaniya, et al., Aggregating and
Thresholdizing Hash-Based Signatures Using
STARKs, ACM Asia Conf. Comput. Commun.
Secur. (2022) 393–407. doi: 10.1145/
3488932.3524128.
78