868 Hits in 5.2 sec

Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks?

Maximilian Schöffel, Frederik Lauer, Carl C. Rheinländer, Norbert Wehn
2022 Sensors  
First, we show that the main contributor to high TLS handshake latency is the higher bandwidth requirement of post-quantum primitives rather than the cryptographic computation itself.  ...  In this paper, we present, to the best of our knowledge, the first in-depth investigation of the application of potential post-quantum key encapsulation mechanisms (KEMs) and digital signature algorithms  ...  A fully post-quantum TLS implementation on embedded devices was presented in [22] .  ... 
doi:10.3390/s22072484 pmid:35408099 pmcid:PMC9003183 fatcat:5lms2zmnznbhpiw7wjsqox67ku

OpenSSLNTRU: Faster post-quantum TLS key exchange [article]

Daniel J. Bernstein
2021 arXiv   pre-print
This paper revisits the choices made in CECPQ2, and shows how to achieve higher performance for post-quantum key exchange in TLS 1.3 using a higher-security algorithm, sntrup761.  ...  Google's CECPQ1 experiment in 2016 integrated a post-quantum key-exchange algorithm, newhope1024, into TLS 1.2.  ...  Permanent ID of this document: a8f6fc35a5dc11da1f125b9f5225d2a9c4c5b08b.  ... 
arXiv:2106.08759v3 fatcat:jl44jdvp6nf7das3rurlsa4np4

Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices [article]

Gustavo Banegas
2021 arXiv   pre-print
While the performance of SUIT has previously been evaluated in the pre-quantum context, it has not yet been studied in a post-quantum context.  ...  CCS CONCEPTS ∙ Computer systems organization → Embedded systems.  ...  Various NIST candidate post-quantum schemes are compared as component algorithms in TLS 1.3 in [58] , analyzing performance, security, and key and signature sizes, as well as the impact of post-quantum  ... 
arXiv:2106.05577v2 fatcat:pcg64enerzgqhe3qw6ime2vksi

Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards [article]

Markku-Juhani O. Saarinen
2020 arXiv   pre-print
Standardization of Post-Quantum Cryptography (PQC) was started by NIST in 2016 and has proceeded to its second elimination round.  ...  The upcoming standards are intended to replace (or supplement) current RSA and Elliptic Curve Cryptography (ECC) on all targets, including lightweight, embedded, and mobile systems.  ...  Post-quantum transition only affects the asymmetric components of TLS 1.3; its symmetric authenticated encryption (AEAD) and key derivation components (cipher suites) readily support post-quantum levels  ... 
arXiv:1912.00916v4 fatcat:ie2z75cgnjgpncgqbt2z5ydrtq

On PQC Migration and Crypto-Agility [article]

Alexander Wiesmaier
2021 arXiv   pre-print
Besides the development of PQC algorithms, the actual migration of IT systems to such new schemes has to be considered, best by utilizing or establishing crypto-agility.  ...  In consequence, it is difficult to judge for both individual application scenarios and on a global scale, whether all (known) challenges have been addressed respectively or what their current state is.  ...  They offer a brief evaluation of the current state of both post-quantum and q u a n t u m cryptography, and highlight the chances and limitations of quantum cryptography.  ... 
arXiv:2106.09599v1 fatcat:itr6zdltirg2ri3ismbeo7vtiq

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

2018 Cryptography  
These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices.  ...  In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation  ...  Jari Kreku modelled the solutions for the simulator and performed the experiments. Sami Lehtonen participated in the design of the work and supported the writing.  ... 
doi:10.3390/cryptography2010005 fatcat:dngahpmopbgtxonuawmwiiiuky


Joppe Bos, Craig Costello, Leo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
Following increasing interest from both companies and government agencies in building quantum computers, a number of works have proposed instantiations of practical post-quantum key exchange protocols  ...  Thus, a question of significant interest to cryptographers, and especially to those currently placing bets on primitives that will withstand quantum adversaries, is how much of an advantage the additional  ...  Our framework for comparing post-quantum algorithms and integration into OpenSSL is available at open-quantum-safe/. Performance comparison and evaluation in TLS.  ... 
doi:10.1145/2976749.2978425 dblp:conf/ccs/BosCDMNNRS16 fatcat:lgev5d3lkjctjh37m2t5dtnxgm

Practical Formal Methods for Real World Cryptography (Invited Talk)

Karthikeyan Bhargavan, Prasad Naldurg, Michael Wagner
2019 Foundations of Software Technology and Theoretical Computer Science  
We describe a tool chain and framework based on the F * programming language to formally specify, verify and compile high-performance cryptographic software that is secure by design.  ...  This tool chain has been used to build a verified cryptographic library called HACL * , and provably secure implementations of sophisticated secure communication protocols like Signal and TLS.  ...  including post-quantum cryptography and homomorphic encryption.  ... 
doi:10.4230/lipics.fsttcs.2019.1 dblp:conf/fsttcs/BhargavanN19 fatcat:uyj2x66q5rcr5ns6zidmsto7yi

Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security

Hannes Tschofenig, Emmanuel Baccelli
2019 IEEE Security and Privacy  
While many of the algorithms are still being evaluated -for example, as part of the NIST Post-Quantum Cryptography standardization effort -there are concerns that some IoT devices that are expected to  ...  Many of the post-quantum algorithms are characterized by slower performance, larger key size, or a larger signature size than conventional public key crypto schemes.  ... 
doi:10.1109/msec.2019.2923973 fatcat:wq6ds4mjcraqneiagxshqzfjbe

Post Quantum Secure Command and Control of Mobile Agents : Inserting quantum-resistant encryption schemes in the Secure Robot Operating System [article]

Richa Varma, Chris Melville, Claudio Pinello, Tuhin Sahai
2020 arXiv   pre-print
Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with the robot operating system (ROS) and C&C of mobile  ...  The development of quantum computing devices poses a unique threat to secure communications due to the vulnerability of asymmetric ciphers to Shor's algorithm.  ...  Several projects have used liboqs in evaluating the performance of post-quantum schemes into new applications that currently use classical algorithms such as RSA.  ... 
arXiv:2009.07937v1 fatcat:3ymhwtfa4fbqlkdmueu4m4ljwq

Thermodynamics of Quantum Systems Under Dynamical Control [chapter]

David Gelbwaser-Klimovsky, Wolfgang Niedenzu, Gershon Kurizki
2015 Advances In Atomic, Molecular, and Optical Physics  
When the modulation interval is short compared to the bath memory time, the system-bath correlations are affected, thereby causing cooling or heating of the TLS, depending on the interval.  ...  The basic model studied here is that of a two-level system (TLS), whose energy is periodically modulated while the system is coupled to thermal baths.  ...  of the system operator S(t) is evaluated in the interaction picture.  ... 
doi:10.1016/bs.aamop.2015.07.002 fatcat:ji2m7jptx5bzbn5vd4ixpzv4ci

Towards a maturity model for crypto-agility assessment [article]

Julian Hohm and Andreas Heinemann and Alexander Wiesmaier
2022 arXiv   pre-print
CAMM consists of five levels, for each level a set of requirements have been formulated based on literature review.  ...  Based on our model, the crytographic agility of an IT landscape can be systematically measured and improved step by step.  ...  Example Legacy algorithms in TLS 1.3 may only be used to ensure backward compatibility with TLS 1.2.  ... 
arXiv:2202.07645v2 fatcat:klxt7fusv5fszlz6cjrnt2uqty

Quantum Zeno effect for open quantum systems [article]

Simon Becker, Nilanjana Datta, Robert Salzmann
2020 arXiv   pre-print
We prove the quantum Zeno effect in open quantum systems whose evolution, governed by quantum dynamical semigroups, is repeatedly and frequently interrupted by the action of a quantum operation.  ...  We also prove the existence of a novel strong quantum Zeno limit for quantum operations for which a certain spectral gap assumption, which all previous results relied on, is lifted.  ...  For open quantum systems, one can not only perform projective measurements but also generalized measurements.  ... 
arXiv:2010.04121v1 fatcat:joifqaztrvbfjboi3iw3zuev54

Quantum Zeno Effect in Open Quantum Systems

Simon Becker, Nilanjana Datta, Robert Salzmann
2021 Annales de l'Institute Henri Poincare. Physique theorique  
In addition, we establish, for the first time, the existence of a quantum Zeno limit for open quantum systems in the case of unbounded generators.  ...  We also prove the existence of a novel strong quantum Zeno limit for quantum operations for which a certain spectral gap assumption, which all previous results relied on, is lifted.  ...  Wolf for getting us interested in the quantum Zeno effect under quantum operations. R.S. would like to thank Niklas Galke for helpful discussions.  ... 
doi:10.1007/s00023-021-01075-8 fatcat:kjnyvryp6rd6liruzu3erpg24q

Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem

Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila
2015 2015 IEEE Symposium on Security and Privacy  
with the design of TLS 1.3.  ...  Our performance data demonstrates that R-LWE is a plausible candidate for providing post-quantum key exchange security in TLS.  ... 
doi:10.1109/sp.2015.40 dblp:conf/sp/BosCNS15 fatcat:b4tg74fd6vbppdq7d23j77kipq
« Previous Showing results 1 — 15 out of 868 results