Practical Implementations of Quantum-Resistant Cryptography

نویسنده

  • Jesús Antonio Soto
چکیده

3 Incorporation of Quantum-safe Algorithms into OpenSSL 5 3.1 Quantum-safe Key Exchange Mechanism . . . . . . . . . . . . 6 3.2 Open Quantum Safe (OQS) and liboqs . . . . . . . . . . . . . 6 3.3 Quantum-Safe KEM in OpenSSL . . . . . . . . . . . . . . . . 8 3.3.1 Stebila’s OpenSSL Fork with RLWE . . . . . . . . . . 8 3.3.2 Singh’s OpenSSL Fork with RLWE . . . . . . . . . . . 9 3.3.3 Open Quantum Safe’s OpenSSL Fork . . . . . . . . . . 9 3.4 Quantum-safe Authentication . . . . . . . . . . . . . . . . . . 11 3.5 Alternative implementations of TLS . . . . . . . . . . . . . . . 11 3.5.1 wolfSSL . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.5.2 BoringSSL . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.5.3 PolarSSL . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.6 On the difficulty of extending OpenSSL . . . . . . . . . . . . . 14

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Implementations of A Quantum-Resistant Key-Exchange Protocol on Embedded systems

Presence of quantum computers is a real threat against the security of currently used public key cryptographic algorithms such as RSA and Elliptic curve cryptography. Isogeny computation on elliptic curves is believed to be difficult even on a quantum computer, and hence isogeny-based protocols represent one of the few truly practical approaches to constructing quantum-resistant cryptosystems. ...

متن کامل

Security of Quantum Cryptography with Realistic Sources

The interest in practical implementations of quantum key distribution (QKD) is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within the scenario of security against individual attacks by an eavesdropper. It illustrates previous result...

متن کامل

WalnutDSA: A Quantum-Resistant Digital Signature Algorithm

In 2005 I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux introduced E-Multiplication, a quantum-resistant, group-theoretic, one-way function which can be used as a basis for many different cryptographic applications. This one-way function was specifically designed for constrained devices, running extremely quickly and requiring very little code. This paper introduces WalnutDSA, a new E-Multipl...

متن کامل

Security Standards and Best Practices for Quantum Key Distribution

Quantum Key Distribution (QKD) systems combine cryptographic primitives with quantum information theory to produce a theoretic unconditionally secure cryptographic key. However, real-world implementations of QKD systems are far from ideal and significantly differ from the theoretic model. Because of this, real-world QKD systems require additional practical considerations when implemented to ach...

متن کامل

Formalization of Quantum Protocols using Coq

Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commerci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017