INTRODUCTION
Over the years, the threat of the quantum computer to traditional exchanges has become more dramatic. It would take advanced cryptography to curb this imminent menace. Cryptography has remained the principal tool to ensure optimum information security. Cryptography does not place heavy reliance on physical data carriers; instead, it transforms the data itself. Top government security agencies like the NSA, CESG and GCHQ are moving for quantum-safe cryptographic schemes. Standardization bodies like the European Telecommunication Standards Institute (ETSI) and the ISO are now searching for global standards. All indication points towards quantum-safe security.
HERE ARE SOME OF THE MEASURES AND TECHNIQUES TO ENSURE SECURITY.
• Symmetric cryptography: Most symmetric cryptosystems like the hash functions (SHA2 or SHA3) are considered QRAs. Symmetric encryptions require the use of a secret key shared between users. With a key size of 256 bits, these systems are safe from quantum attacks. Doubling the bit number of the cryptosystems provides safety against even the Grover’s algorithm.
• Asymmetric key exchange and signature: This requires public key cryptography for authentication and secret keys exchange. The asymmetric key exchange is applied in a symmetric scheme.
• Code-based cryptography: The McEliece cryptosystem uses the oldest quantum-resistant algorithm, yet it is still unbroken. Code-based cryptosystems typically have fast encryption and decryption algorithms. This kind of cryptography provides more structure to the codes, hence can also be used in signatures.
• Lattice-based cryptography: Lattice cryptography is not new, and it is applicable in asymmetric cryptography and signing. New lattice-based algorithms like the “Learning with errors” and “ring learning with errors” are still under review. A lot of the new lattice-based key establishment algorithms are provably efficient and very parallelizable.
However, it has become very difficult to estimate the security of lattice schemes accurately. Lattice cryptography is gradually expanding into other subtypes of cryptography like homomorphic encryption and code obfuscation.
• Multivariate cryptography: There is a common difficulty in solving systems of multivariate polynomials over finite fields. It is a practical model of the quantum-safe cryptography. Multivariate cryptography has become very productive concerning design, cryptanalysis and in the use of signatures. Multivariate cryptography is very successful in signature applications because they provide the shortest signature.
• Hash-based cryptography: Hash-based signatures are digital signatures that are created with hash functions. These signature schemes mostly have larger signature sizes than the asymmetric key solutions. Hash-based signatures consist of a series of subkeys as each signature is carried out with a different subkey. This type of cryptography is still undergoing some level of standardization.
• Quantum-safe signatures and authentication: As highlighted above, quantum-resistant signature algorithms are already in existence. Now the new security direction is post-quantum signing and authentication. It is important to note that signature and authentication are essential aspects of information security. The authentication and integrity of the QUUBE Exchange need to remain intact. A lot of resources goes into this post-quantum signing and authentication, which is still under review. Also, the data encryption of the QUUBE Exchange relies on mostly symmetric cryptography which makes it safe. AES with 256-bit keys is resistant to both classical and quantum attacks. And if new forms of threat occur, then the key length would be increased in the future.
CONCLUSION
The essence of the QUUBE project is primarily to ensure security against the quantum computers. The QUUBE exchange is still in the development phase, so nothing is certain yet. Listed above are the variant of the methods with which QUUBE Exchange ensures optimum security. The different type of cryptography discussed have their pros and cons. QUUBE Exchange might need to combine these features to get the best. It will definitely still develop the existing cryptography schemes and techniques to ensure functional security.
USEFUL LINKS;
Website: https://quube.exchange/
Facebook: https://facebook.com/QuubeQuantum
Twitter: https://twitter.com/quube_exchange
Telegram: https://t.me/QuantumWarriors
Medium: https://medium.com/@quube_exchange_m
Whitepaper: https://quube.exchange/static/assets/docs/Whitepaper-QUUBE-190917.pdf
AUTHORS DETAILS
Bitcointalk username- Corer
Bitcointalk profile link- https://bitcointalk.org/index.php?action=profile;u=2373697