Practical Implementations of Quantum-Resistant Cryptography
نویسنده
چکیده
3 Incorporation of Quantum-safe Algorithms into OpenSSL 5 3.1 Quantum-safe Key Exchange Mechanism . . . . . . . . . . . . 6 3.2 Open Quantum Safe (OQS) and liboqs . . . . . . . . . . . . . 6 3.3 Quantum-Safe KEM in OpenSSL . . . . . . . . . . . . . . . . 8 3.3.1 Stebila’s OpenSSL Fork with RLWE . . . . . . . . . . 8 3.3.2 Singh’s OpenSSL Fork with RLWE . . . . . . . . . . . 9 3.3.3 Open Quantum Safe’s OpenSSL Fork . . . . . . . . . . 9 3.4 Quantum-safe Authentication . . . . . . . . . . . . . . . . . . 11 3.5 Alternative implementations of TLS . . . . . . . . . . . . . . . 11 3.5.1 wolfSSL . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.5.2 BoringSSL . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.5.3 PolarSSL . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.6 On the difficulty of extending OpenSSL . . . . . . . . . . . . . 14
منابع مشابه
Efficient Implementations of A Quantum-Resistant Key-Exchange Protocol on Embedded systems
Presence of quantum computers is a real threat against the security of currently used public key cryptographic algorithms such as RSA and Elliptic curve cryptography. Isogeny computation on elliptic curves is believed to be difficult even on a quantum computer, and hence isogeny-based protocols represent one of the few truly practical approaches to constructing quantum-resistant cryptosystems. ...
متن کاملSecurity of Quantum Cryptography with Realistic Sources
The interest in practical implementations of quantum key distribution (QKD) is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within the scenario of security against individual attacks by an eavesdropper. It illustrates previous result...
متن کاملWalnutDSA: A Quantum-Resistant Digital Signature Algorithm
In 2005 I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux introduced E-Multiplication, a quantum-resistant, group-theoretic, one-way function which can be used as a basis for many different cryptographic applications. This one-way function was specifically designed for constrained devices, running extremely quickly and requiring very little code. This paper introduces WalnutDSA, a new E-Multipl...
متن کاملSecurity Standards and Best Practices for Quantum Key Distribution
Quantum Key Distribution (QKD) systems combine cryptographic primitives with quantum information theory to produce a theoretic unconditionally secure cryptographic key. However, real-world implementations of QKD systems are far from ideal and significantly differ from the theoretic model. Because of this, real-world QKD systems require additional practical considerations when implemented to ach...
متن کاملFormalization of Quantum Protocols using Coq
Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commerci...
متن کامل