Implementation and research of post-quantum cryptography methods for distributed authorization systems

Students Name: Mazepa Oleh Andriiovych
Qualification Level: magister
Speciality: System Design
Institute: Institute of Computer Science and Information Technologies
Mode of Study: full
Academic Year: 2023-2024 н.р.
Language of Defence: ukrainian
Abstract: Мазепа О. А., Фармага І. В. (керівник). Аналіз та реалізація застосування методів пост-квантової криптографії для розподілених систем авторизації – Національний університет «Львівська політехніка», Львів, 2023.Extended abstract. The development of quantum technologies threatens the security of traditional cryptosystems in use today. Post-quantum cryptography offers algorithms that are resistant to possible future quantum attacks. One of the key applications of post-quantum cryptography is user authentication and authorization in distributed systems. The work aims to study and improve the efficiency of quantum key distribution (QKD) algorithms, focusing on their ability to guarantee secure communication in digital systems. To achieve this goal, a number of tasks need to be solved: • to study in detail the stages of quantum key distribution; • analyze methods for effective modeling and implementation of a quality control system in the digital environment; • analyze the impact of eavesdropping on the security of QKD systems; • develop models of communication architecture using the advantages of quantum cryptography; • to model the BB84 protocol; • analyze the effectiveness of QKD for secure communication. The object of research is to evaluate post-quantum secure authentication methods suitable for quantum key distribution. The subject of the study is algorithms and protocols for quantum key distribution. The research method is simulation modeling and performance analysis. The novelty of the study is the development of models of communication architecture using QKD and the analysis of the effectiveness of QKD protocols for secure communication. The practical value lies in the results obtained, which can have significant implications for a wide range of industries, offering a reliable solution to the growing challenge of cyber threats. The personal contribution of the master’s student is to develop an architectural simulation model, implement the BB84 protocol and analyze the effectiveness of QKD for secure communication. Keywords - authentication, authorisation, BB84, quantum key distribution, cryptanalysis, cryptography, post-quantum. References. Architecture and protocols of the future European quantum key distribution network / Mehrdad Dianati, Romain Alle?aume, Maurice Gagnaire, and Xuemin (Sherman) ShenMilton. // John Wiley & Sons, Ltd., Paris, France, security comm. networks – 2008. Secure Communication Using Cryptography and Covert Channel / Tamer S.A. Fatayer // Computer and Network Security – 2020 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems / R.L. Rivest, A. Shamir, L. Adleman // Communications of the ACM, Volume 21, Issue 2, New York – 1 February 1978 Quantum cryptography: Public key distribution and coin tossing. / C. H. Bennett and G. Brassard. // IEEE International Conference on Computers, Systems and Signal Processing, New York – 1984.