Full text
![]() |
PDF
- Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (132kB) |
Grote, Olaf and Ahrens, Andreas and Benavente Peces, César (2019). Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques. In: "Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS 2019, Vienna, Austria, September 19-20, 2019", 19 Seb - 20 Seb 2019, Vienna, Austria. ISBN 978-989-758-385-8. pp. 91-98. https://doi.org/10.5220/0008162800910098.
Title: | Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques |
---|---|
Author/s: |
|
Item Type: | Presentation at Congress or Conference (Speech) |
Event Title: | Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS 2019, Vienna, Austria, September 19-20, 2019 |
Event Dates: | 19 Seb - 20 Seb 2019 |
Event Location: | Vienna, Austria |
Title of Book: | Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2019) |
Date: | 20 September 2019 |
ISBN: | 978-989-758-385-8 |
Subjects: | |
Faculty: | E.T.S.I. y Sistemas de Telecomunicación (UPM) |
Department: | Teoría de la Señal y Comunicaciones |
Creative Commons Licenses: | None |
![]() |
PDF
- Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (132kB) |
Current security protocols use cryptographic methods based on asymmetric and symmetric schemes. These are used for encrypted communication of information or for general data encryption. The security of these methods is based on well researched methods and known mathematical problems. These have been developed for common computing resources and with the certainty that they cannot be broken at a determinable runtime with finite resources. This excludes novel attack vectors such as those of a quantum computer using quantum algorithms. These cryptographic methods, especially the asymmetric schemes, are not prepared against quan- tum attacks and not considered quantum safe. Even the security of current quantum safe symmetric schemes is not based on proven security against quantum attacks. In order to effectively counter this threat, a new and effective strategy is necessary. One point of this strategy is the post-quantum cryptography to evaluate new quantum-safe cryptographic principles. The second point is to research security protocols which are quantum safe and resistible against quantum attacks. This paper describes the strategy of post-quantum cryptography and crypto-agility.
Item ID: | 72437 |
---|---|
DC Identifier: | https://oa.upm.es/72437/ |
OAI Identifier: | oai:oa.upm.es:72437 |
DOI: | 10.5220/0008162800910098 |
Deposited by: | Olaf Grote |
Deposited on: | 23 Jan 2023 12:02 |
Last Modified: | 23 Jan 2023 12:02 |