Figures and Tables from this paper
- figure 1
- figure 2
- figure 3
- figure 4
- table I
- table II
Topics
OpenVPN (opens in a new tab)Quantum Computer (opens in a new tab)Public Key Cryptography (opens in a new tab)Transport Layer Security (opens in a new tab)OpenSSL (opens in a new tab)Hypertext Transfer Protocol Secure (opens in a new tab)CPU Overhead (opens in a new tab)
6 Citations
- Moritz B. MuellerJ. D. JongM. V. HeeschBenno J. OvereinderR. V. Rijswijk-Deij
- 2020
Computer Science, Engineering
Comput. Commun. Rev.
This research lays the foundation for making DNSSEC, and protocols with similar constraints ready for PQC, and evaluates current candidate PQC signature algorithms in the third round of the NIST competition on their suitability for use in DNSSEC.
- 8
- PDF
- Moritz MüllerBenno J. OvereinderR. V. Rijswijk-Deij
- 2020
Computer Science, Engineering
This research lays the foundation for making DNSSEC, and protocols with similar constraints ready for PQC, and evaluates current candidate PQC signature algorithms in the third round of the NIST competition on their suitability for use in DNSSEC.
- PDF
- M. MehicLibor Michalek M. Voznák
- 2024
Computer Science, Engineering
The security challenges and approaches in 5G networks concerning network protocols, interfaces and management organizations are surveyed and the performance and technologies of post-quantum cryptography are discussed.
- Alin-Bogdan Popa
- 2023
Computer Science, Engineering
2023 22nd RoEduNet Conference: Networking in…
This work proposes a VPN solution enhanced by QKD for quantum-resistant encryption, it is implemented using IDQ Cerberis XGQKD devices, and its general-purpose capabilities are tested by performing an encrypted video-conference between two endpoints.
- A. GironRicardo Felipe CustódioF. Rodríguez-Henríquez
- 2022
Computer Science, Physics
Journal of Cryptographic Engineering
This paper presents a systematic mapping study of post-quantum hybrid KEXs, given insights into their characteristics, terminology, efficiency, security and open design challenges, and proposes a hybrid K EX classification taking into account several relevant design considerations associated to these schemes.
- 4
- Nouri AlnahawiNicolai SchmittA. WiesmaierA. HeinemannTobias Grasmeyer
- 2023
Computer Science
IACR Cryptol. ePrint Arch.
More agile design paradigms are required in developing new IT-systems, and in refactoring existing ones, in order to realize crypto-agility on a broad scale.
- 6
- PDF
32 References
- Lidong ChenS. Jordan Daniel Smith-Tone
- 2016
Computer Science, Physics
The National Institute of Standards and Technology (NIST)'s current understanding about the status of quantum computing and post-quantum cryptography is shared, and NIST’s initial plan to move forward is outlined.
- 506
- PDF
- E. AlkımL. DucasT. PöppelmannP. Schwabe
- 2016
Computer Science, Physics
USENIX Security Symposium
New parameters and a better suited error distribution are proposed, the scheme’s hardness against attacks by quantum computers is analyzed in a conservative way, a new and more effi-cient error-reconciliation mechanism is introduced, and a defense against backdoors and all-for the price-of-one attacks is proposed.
- 778
- PDF
- S.H.S. de Vries
- 2016
Computer Science
This work demonstrates and evaluates how Niederreiter can be used for quantum-secure key exchanges by implementing it in OpenVPN, and provides parameters for 128-bit quantum security that result in almost 35% smaller keys than parameters currently available in literature.
- 14
- PDF
- Joppe W. BosCraig CostelloM. NaehrigD. Stebila
- 2015
Computer Science, Physics
2015 IEEE Symposium on Security and Privacy
This work demonstrates the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, and accompanies these cipher suites with a rigorous proof of security.
- 343
- PDF
- Joppe W. BosCraig Costello D. Stebila
- 2016
Computer Science, Physics
IACR Cryptol. ePrint Arch.
Despite conventional wisdom that generic lattices might be too slow and unwieldy, it is demonstrated that LWE-based key exchange is quite practical: the authors' constant time implementation requires around 1.3ms computation time for each party; compared to the recent NewHope R-LWE scheme, communication sizes increase by a factor of 4.7x, but remain under 12 KiB in each direction.
- 353
- PDF
- E. AlkımPaulo L. BarretoNina BindelJuliane KrämerP. LongaJ. E. Ricardini
- 2019
Computer Science, Mathematics
IACR Cryptol. ePrint Arch.
We present qTESLA, a post-quantum provably-secure digital signature scheme that exhibits several attractive features such as simplicity, strong security guarantees against quantum adversaries, and…
- 90
- PDF
- Jan-Pieter D'AnversA. KarmakarS. RoyF. Vercauteren
- 2018
Computer Science, Mathematics
IACR Cryptol. ePrint Arch.
Saber is introduced, a package of cryptographic primitives whose security relies on the hardness of the Module Learning With Rounding problem (Mod-LWR), and the design goals were simplicity, efficiency and flexibility.
- 237
- PDF
- M. BaldiAlessandro BarenghiF. ChiaraluceGerardo PelosiPaolo Santini
- 2018
Computer Science, Physics
PQCrypto
This work presents a new code-based key encapsulation mechanism (KEM) called LEDAkem. It is built on the Niederreiter cryptosystem and relies on quasi-cyclic low-density parity-check codes as secret…
- 53 [PDF]
- Joppe W. BosL. Ducas D. Stehlé
- 2018
Computer Science
2018 IEEE European Symposium on Security and…
This paper introduces Kyber, a portfolio of post-quantum cryptographic primitives built around a key-encapsulation mechanism (KEM), based on hardness assumptions over module lattices, and introduces a CPA-secure public-key encryption scheme and eventually construct, in a black-box manner, CCA-secure encryption, key exchange, and authenticated-key-exchange schemes.
- 589
- PDF
- Melissa ChaseDavid Derler Gregory M. Zaverucha
- 2017
Computer Science
CCS
We propose a new class of post-quantum digital signature schemes that: (a) derive their security entirely from the security of symmetric-key primitives, believed to be quantum-secure, and (b) have…
- 251
- PDF
...
...
Related Papers
Showing 1 through 3 of 0 Related Papers