Preprint Article Version 1 This version is not peer-reviewed

A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security

Version 1 : Received: 23 September 2024 / Approved: 24 September 2024 / Online: 24 September 2024 (10:06:10 CEST)

How to cite: Wang, Y.; Li, L.; Zhou, Y.; Zhang, H. A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security. Preprints 2024, 2024091874. https://doi.org/10.20944/preprints202409.1874.v1 Wang, Y.; Li, L.; Zhou, Y.; Zhang, H. A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security. Preprints 2024, 2024091874. https://doi.org/10.20944/preprints202409.1874.v1

Abstract

The RSA cryptosystem has long been a fundamental component of contemporary public key in- frastructure. However, recent developments in quantum computing and mathematical theory have introduced signicant challenges to its security. A fully operational quantum computer would allow for the application of Shor's algorithm, enabling the ecient factoring of large integers, thereby com- promising the integrity of RSA and other cryptographic methods dependent on discrete logarithms. Although Grover's algorithm poses a comparatively smaller threat to symmetric encryption systems, it still presents a vulnerability by accelerating key search processes. The looming threat from quan- tum technologies has driven a surge in research aimed at developing quantum-resistant cryptography. These eorts focus on cryptographic techniques grounded in error-correcting codes, lattice structures, and multivariate public key systems, all of which leverage the complexity of NP-hard problemssuch as solving multivariate quadratic equationsto preserve security in a post-quantum world. This pa- per reviews the current progress in quantum-resistant encryption methods, particularly emphasizing the role of robust trapdoor functions. Additionally, it provides a comprehensive analysis of critical multivariate cryptosystem frameworks, such as Matsumoto-Imai, Oil and Vinegar, and Polly Cracker schemes. It also examines advances in lattice-based systems like Kyber and Crystals-Dilithium, which are undergoing assessment by NIST for potential standardization. As quantum computing continues to evolve, the demand for cutting-edge cryptographic solutions to safeguard digital communications grows increasingly pressing.

Keywords

RSA encryption; quantum-resistant cryptography; lattice-based cryptography; multivariate public key cryptosystems; NP-hard problems; quantum computing threats; digital security

Subject

Computer Science and Mathematics, Applied Mathematics

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.