Analysis of Post Quantum RSA-Encryption and Post Quantum RSA-Signature

Maitri Vaghela, Computer Science MS

Abstract

There have been numerous impressive algorithms submitted for round 1 of post quantum cryptography hosted by NIST. Out of 50, algorithms like Big Quake, CFPKM, Dink Key Exchange, HILA5, NTRU Prime, Post-quantum RSA-Encryption, Post-quantum RSA-Signature and qTESLA were chosen at first. Finally, Post-quantum RSA-Encryption and Post-quantum RSA-Signature were chosen for the analysis. The reason was that the RSA still remains standardized inspite of the key sizes that have been shown vulnerable to the attacks. Also, post quantum RSA(pqRSA) uses extremely large keys to stop Shor’s algorithm with the help of relatively short secret primes and small encryption/verification exponents.

Preliminary Outline of the Paper

Overview

The pqRSA submission provides signatures, key encapsulation and public key encryption as well. Each operation consists of two parameters, namely K which is a power of 2 and B which is a positive multiple of 8.

Below is the list of parameter sets for Encryption, KEM and Signature.

Operation K B
Encryption 512 512
16384 512
262144 1024
8388608 1024
KEM 512 512
16384 512
262144 1024
8388608 1024
Signatures 512 512
16384 512
262144 1024
8388608 1024

Abbreviations

References

[1]Bernstein et al. Post-quantum RSA.online. Available at:csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions