We present in this paper an algorithm for exchanging session keys, coupled with an hashing encryption module. We show schemes designed for their potential invulnerability to classical and quantum attacks. In turn, if the parameters included were appropriate, brute-force attacks exceed the (five) security levels used in the NIST competition of new post-quantum standards. The original idea consists of products of rectangular matrices in Zp as public values and whose factorization is proved to be an NP-complete problem. We present running times as a function of the explored parameters and their link with operational safety. To our knowledge there are no classical and quantum attacks of polynomial complexity available at hand, remaining only the systematic exploration of the private-key space.
翻译:在本文中,我们提出了一个交换会话键的算法,加上一个散列加密模块。我们展示了为它们可能易受古典和量子攻击而设计的各种计划。反过来,如果包括参数是适当的,野蛮攻击超过了NIST新的量子后标准竞争中使用的(5)安全等级。最初的想法包括Zp的矩形矩阵产品作为公共价值,其计算被证明是一个NP完整的问题。我们提出运行时间作为所探索参数的函数及其与操作安全的联系。据我们所知,手头没有可资利用的多元复杂性的经典和量子攻击,仅是系统探索私人钥匙空间。