PQCRYPTO Post-Quantum Cryptography for Long-Term Security
نویسندگان
چکیده
This document provides the PQCRYPTO project’s initial recommendations for post-quantum cryptographic algorithms for symmetric encryption, symmetric authentication, public-key encryption, and public-key signatures. These recommendations are chosen for confidence in their long-term security, rather than for efficiency (speed, bandwidth, etc.). Research in the following years should lead to confidence in the security of some systems (either preexisting or developed in the project) that provide better efficiency and usability.
منابع مشابه
A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems
Multivariate Public Key Cryptography(MPKC) has become one of a few options for security in the quantum model of computing. Though a few multivariate systems have resisted years of effort from the cryptanalytic community, many such systems have fallen to a surprisingly small pool of techniques. There have been several recent attempts at formalizing more robust security arguments in this venue wi...
متن کاملSelecting Parameters for the Rainbow Signature Scheme
Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in a post-quantum world. One of the most promising candidates in this area is the Rainbow signature scheme, which was first proposed by J. Ding and D. Schmidt in 2005. In this paper we develop a model of security for the Rainbow signature scheme. We use this model to find para...
متن کاملOn the security of HMFEv
In this short report, we study the security of the new multivariate signature scheme HMFEv proposed at PQCrypto 2017.
متن کاملTransitioning to a Quantum-Resistant Public Key Infrastructure
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to post-quantum cryptography. In addition to creating post-quantum primitives, we must also plan how to adapt the cryptographic infrastructure for the transition, especially in scenarios such as public key infrastructures (PKIs) with many participants. The use of hybrids—multiple algorithms in paral...
متن کاملPost-quantum Security of the Sponge Construction
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengthening of collision-resistance). We show that the sponge construction is collapsing (and in consequence quantum collision-resistant) under suitable assumptions about the underlying block function. In p...
متن کامل