Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques

Grote, Olaf and Ahrens, Andreas and Benavente Peces, César (2019). Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques. In: "Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS 2019, Vienna, Austria, September 19-20, 2019", 19 Seb - 20 Seb 2019, Vienna, Austria. ISBN 978-989-758-385-8. pp. 91-98. https://doi.org/10.5220/0008162800910098.

Description

Title: Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques
Author/s:
  • Grote, Olaf
  • Ahrens, Andreas
  • Benavente Peces, César
Item Type: Presentation at Congress or Conference (Speech)
Event Title: Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS 2019, Vienna, Austria, September 19-20, 2019
Event Dates: 19 Seb - 20 Seb 2019
Event Location: Vienna, Austria
Title of Book: Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2019)
Date: 20 September 2019
ISBN: 978-989-758-385-8
Subjects:
Faculty: E.T.S.I. y Sistemas de Telecomunicación (UPM)
Department: Teoría de la Señal y Comunicaciones
Creative Commons Licenses: None

Full text

[img] PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (132kB)

Abstract

Current security protocols use cryptographic methods based on asymmetric and symmetric schemes. These are used for encrypted communication of information or for general data encryption. The security of these methods is based on well researched methods and known mathematical problems. These have been developed for common computing resources and with the certainty that they cannot be broken at a determinable runtime with finite resources. This excludes novel attack vectors such as those of a quantum computer using quantum algorithms. These cryptographic methods, especially the asymmetric schemes, are not prepared against quan- tum attacks and not considered quantum safe. Even the security of current quantum safe symmetric schemes is not based on proven security against quantum attacks. In order to effectively counter this threat, a new and effective strategy is necessary. One point of this strategy is the post-quantum cryptography to evaluate new quantum-safe cryptographic principles. The second point is to research security protocols which are quantum safe and resistible against quantum attacks. This paper describes the strategy of post-quantum cryptography and crypto-agility.

More information

Item ID: 72437
DC Identifier: https://oa.upm.es/72437/
OAI Identifier: oai:oa.upm.es:72437
DOI: 10.5220/0008162800910098
Deposited by: Olaf Grote
Deposited on: 23 Jan 2023 12:02
Last Modified: 23 Jan 2023 12:02
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM