Loading [MathJax]/extensions/MathMenu.js
Towards UAT Methodology on Cryptographic Library Assessment | IEEE Conference Publication | IEEE Xplore

Abstract:

This article delineates a User Acceptance Testing (UAT) methodology specifically tailored for a cryptographic transformation library incorporating an advanced encryption ...Show More

Abstract:

This article delineates a User Acceptance Testing (UAT) methodology specifically tailored for a cryptographic transformation library incorporating an advanced encryption scheme based on the generalized Suzuki 2-groups within the MST3 cryptosystem framework. The impetus for augmenting existing cryptosystem methodologies stems from rapid advancements in quantum computing. These quantum computers possess formidable computational capabilities that can exploit vulnerabilities inherent in many extant public-key cryptosystems, particularly those reliant on factorization and discrete logarithms, such as RSA and ECC. For nearly two decades, the cryptographic community has explored using noncommutative groups as a foundation for constructing quantum-resistant cryptosystems. A seminal contribution in this field was the unsolvable word problem articulated by Wagner and Magyarik, which utilizes groups of permutations and represents a promising avenue in cryptosystem development. The most recent iteration of this concept is embodied in the MST3 cryptosystem, based on the Suzuki group. The initial deployment of the cryptosystem using the generalized Suzuki 2group faced constraints in terms of encryption capabilities and vulnerability to exhaustive attacks. Recent years have witnessed numerous proposals aimed at refining the fundamental design of this system. The research conducted by the authors of this article significantly broadens the application scope of public cryptography by enhancing parameterization based on non-Abelian groups. The article provides a detailed exposition of the methodology employed for testing the practical implementation of the cryptographic transformation library, focusing on the enhanced encryption scheme utilizing Suzuki 2-groups. Moreover, it confirms the operational viability of this approach.
Date of Conference: 19-21 September 2024
Date Added to IEEE Xplore: 16 October 2024
ISBN Information:

ISSN Information:

Conference Location: Ceske Budejovice, Czech Republic

Contact IEEE to Subscribe

References

References is not available for this document.