Preview

Herald of the Kazakh-British Technical University

Advanced search

MODERN APPROACHES TO CRYPTOGRAPHIC KEY MANAGEMENT AND APPLICATION OF DIGITAL SIGNATURE

https://doi.org/10.55452/1998-6688-2025-22-3-75-84

Abstract

This paper explores the challenges associated with cryptographic key management and highlights the importance of developing efficient protocols to ensure secure and trustworthy key exchange in cryptographic systems. It focuses on the Schnorr digital signature scheme, recognized for its features such as indivisibility, non-repudiation, and resistance to message replay attacks. The study introduces a modified version of the Schnorr scheme, incorporating a non-positional polynomial number system. It outlines the process of generating random numbers for keys and computing necessary values using selected polynomial bases. The implementation of non-positional polynomial number system in the creation of non-traditional digital signature algorithms and key management mechanisms significantly improves both the reliability and performance of cryptographic operations. Furthermore, the paper discusses the potential for adapting the proposed scheme to enhance resistance against quantum computing threats, contributing to the development of quantum-resilient cryptographic solutions.

About the Authors

N. Kapalova
Institute of Information and Computational Technologies CS MSHE RK
Kazakhstan

Cand.Tech.Sc., Associate Professor

Almaty



A. Abisheva
Al-Farabi Kazakh National University
Russian Federation

PhD student

Almaty



References

1. Fomina, I.A. Key management in cryptographic systems. Bulletin of the Nizhny Novgorod University named after N.I.Lobachevsky, 4(1),165–169 (2010).

2. Moise, G., Gangea, O. Intelligent Management of the Cryptographic Keys. Int. J. of Computers, Communications & Control, 4(1), 150–157 (2011).

3. Adams, C., & Farrell, S. Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC 2510. (1999). https://tools.ietf.org/html/rfc2510.

4. Housley, R., Polk, W., Ford, W., & Solo, D. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 3280. (2002). https://tools.ietf.org/html/rfc3280.

5. Chokhani, S., & Ford, W. Internet Public Key Infrastructure Certificate Policy and Certification Practices Framework. RFC 2527. (1995). https://tools.ietf.org/html/rfc2527.

6. Aristarkhov, I.V. Management of certificates of electronic signature verification keys. Diss. cand. Of Technical Sciences. 2012 Moscow

7. Sinev, V.E. Methods of construction and development of practical group signature protocols and algebraic algorithms for protective transformations. Diss. cand. of Technical Sciences. St. Petersburg, 2017, 166 p.

8. Moldovyan, N.A., Moldovyan, A.A. Introduction to public key cryptosystems. Tutorial. St. Petersburg. "BHV-Petersburg", 2005

9. Schnorr, C.P. Efficient Signature Generation by Smart Cards. J. Cryptology, 161–174 (1991).

10. Kolesnikov P.V. Schnorr scheme in cryptography. Computer systems and networks: collection of articles of the 59th scientific conference of postgraduates, master's students and students, Minsk, April 17–21, 2023. Belarusian State University of Informatics and Radioelectronics (Minsk, 2023), pp. 393–396.

11. Watrous, Jo. Zero-knowledge against quantum attacks. Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing. 296–305 (2008). https://doi.org/10.1145/1132516.1132560.

12. Schnorr, C.P. Efficient identification and signatures for smart cards. Advances in cryptology – CRYPTO’89. Springer-Verlag LNCS, 435, 239–252 (1990).

13. Moldovyan, D.N., Moldovyan, N.A. A New Hard Problem over Non-Commutative Finite Groups for Cryptographic Protocols. Proceedings of the international conference MMM-ACNS 2010. I. Kotenko and V. Skormin (Eds.): MMM-ACNS 2010, LNCS. Springer, Heidelberg. V. 6258. P. 183–194.

14. Pointcheval, D., Stern, J. Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology, 13, 361–396 (2000).

15. Akushsky I. Ya., Yuditsky D.I. Machine arithmetic in residual classes. M.: Sov.radio, 1968. 439 p.

16. Biyashev R.G. Development and research of methods for end-to-end increase of reliability in data exchange systems of distributed automated control systems: Dis. d. tech. sciences. M., 1985. 328 p.

17. Biyashev R.G., Kapalova N.A., Nysanbaeva S.E. Development and study of a modified DiffieHellman algorithm based on modular arithmetic. Actual problems of information technology security: Proc. III Int. scientific-practical. conf. Under the general editorship of O.N. Zhdanov, V.V. Zolotarev. Siberian State Aerospace University, Krasnoyarsk, September 9–11, 2009 (Krasnoyarsk, 2009), pp. 18–22.


Review

For citations:


Kapalova N., Abisheva A. MODERN APPROACHES TO CRYPTOGRAPHIC KEY MANAGEMENT AND APPLICATION OF DIGITAL SIGNATURE. Herald of the Kazakh-British Technical University. 2025;22(3):75-84. (In Russ.) https://doi.org/10.55452/1998-6688-2025-22-3-75-84

Views: 12


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6688 (Print)
ISSN 2959-8109 (Online)