A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks?
2022
Sensors
First, we show that the main contributor to high TLS handshake latency is the higher bandwidth requirement of post-quantum primitives rather than the cryptographic computation itself. ...
In this paper, we present, to the best of our knowledge, the first in-depth investigation of the application of potential post-quantum key encapsulation mechanisms (KEMs) and digital signature algorithms ...
A fully post-quantum TLS implementation on embedded devices was presented in [22] . ...
doi:10.3390/s22072484
pmid:35408099
pmcid:PMC9003183
fatcat:5lms2zmnznbhpiw7wjsqox67ku
OpenSSLNTRU: Faster post-quantum TLS key exchange
[article]
2021
arXiv
pre-print
This paper revisits the choices made in CECPQ2, and shows how to achieve higher performance for post-quantum key exchange in TLS 1.3 using a higher-security algorithm, sntrup761. ...
Google's CECPQ1 experiment in 2016 integrated a post-quantum key-exchange algorithm, newhope1024, into TLS 1.2. ...
Permanent ID of this document: a8f6fc35a5dc11da1f125b9f5225d2a9c4c5b08b. ...
arXiv:2106.08759v3
fatcat:jl44jdvp6nf7das3rurlsa4np4
Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices
[article]
2021
arXiv
pre-print
While the performance of SUIT has previously been evaluated in the pre-quantum context, it has not yet been studied in a post-quantum context. ...
CCS CONCEPTS ∙ Computer systems organization → Embedded systems. ...
Various NIST candidate post-quantum schemes are compared as component algorithms in TLS 1.3 in [58] , analyzing performance, security, and key and signature sizes, as well as the impact of post-quantum ...
arXiv:2106.05577v2
fatcat:pcg64enerzgqhe3qw6ime2vksi
Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards
[article]
2020
arXiv
pre-print
Standardization of Post-Quantum Cryptography (PQC) was started by NIST in 2016 and has proceeded to its second elimination round. ...
The upcoming standards are intended to replace (or supplement) current RSA and Elliptic Curve Cryptography (ECC) on all targets, including lightweight, embedded, and mobile systems. ...
Post-quantum transition only affects the asymmetric components of TLS 1.3; its symmetric authenticated encryption (AEAD) and key derivation components (cipher suites) readily support post-quantum levels ...
arXiv:1912.00916v4
fatcat:ie2z75cgnjgpncgqbt2z5ydrtq
On PQC Migration and Crypto-Agility
[article]
2021
arXiv
pre-print
Besides the development of PQC algorithms, the actual migration of IT systems to such new schemes has to be considered, best by utilizing or establishing crypto-agility. ...
In consequence, it is difficult to judge for both individual application scenarios and on a global scale, whether all (known) challenges have been addressed respectively or what their current state is. ...
They offer a brief evaluation of the current state of both post-quantum and q u a n t u m cryptography, and highlight the chances and limitations of quantum cryptography. ...
arXiv:2106.09599v1
fatcat:itr6zdltirg2ri3ismbeo7vtiq
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
2018
Cryptography
These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all kinds of devices, including energy-restricted Internet of Things (IoT) devices. ...
In this study, we explore and compare the feasibility and energy efficiency of selected cryptographic layer and physical layer approaches by applying an evaluation approach that is based on simulation ...
Jari Kreku modelled the solutions for the simulator and performed the experiments. Sami Lehtonen participated in the design of the work and supported the writing. ...
doi:10.3390/cryptography2010005
fatcat:dngahpmopbgtxonuawmwiiiuky
Frodo
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
Following increasing interest from both companies and government agencies in building quantum computers, a number of works have proposed instantiations of practical post-quantum key exchange protocols ...
Thus, a question of significant interest to cryptographers, and especially to those currently placing bets on primitives that will withstand quantum adversaries, is how much of an advantage the additional ...
Our framework for comparing post-quantum algorithms and integration into OpenSSL is available at https://github.com/ open-quantum-safe/. Performance comparison and evaluation in TLS. ...
doi:10.1145/2976749.2978425
dblp:conf/ccs/BosCDMNNRS16
fatcat:lgev5d3lkjctjh37m2t5dtnxgm
Practical Formal Methods for Real World Cryptography (Invited Talk)
2019
Foundations of Software Technology and Theoretical Computer Science
We describe a tool chain and framework based on the F * programming language to formally specify, verify and compile high-performance cryptographic software that is secure by design. ...
This tool chain has been used to build a verified cryptographic library called HACL * , and provably secure implementations of sophisticated secure communication protocols like Signal and TLS. ...
including post-quantum cryptography and homomorphic encryption. ...
doi:10.4230/lipics.fsttcs.2019.1
dblp:conf/fsttcs/BhargavanN19
fatcat:uyj2x66q5rcr5ns6zidmsto7yi
Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security
2019
IEEE Security and Privacy
While many of the algorithms are still being evaluated -for example, as part of the NIST Post-Quantum Cryptography standardization effort -there are concerns that some IoT devices that are expected to ...
Many of the post-quantum algorithms are characterized by slower performance, larger key size, or a larger signature size than conventional public key crypto schemes. ...
doi:10.1109/msec.2019.2923973
fatcat:wq6ds4mjcraqneiagxshqzfjbe
Post Quantum Secure Command and Control of Mobile Agents : Inserting quantum-resistant encryption schemes in the Secure Robot Operating System
[article]
2020
arXiv
pre-print
Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with the robot operating system (ROS) and C&C of mobile ...
The development of quantum computing devices poses a unique threat to secure communications due to the vulnerability of asymmetric ciphers to Shor's algorithm. ...
Several projects have used liboqs in evaluating the performance of post-quantum schemes into new applications that currently use classical algorithms such as RSA. ...
arXiv:2009.07937v1
fatcat:3ymhwtfa4fbqlkdmueu4m4ljwq
Thermodynamics of Quantum Systems Under Dynamical Control
[chapter]
2015
Advances In Atomic, Molecular, and Optical Physics
When the modulation interval is short compared to the bath memory time, the system-bath correlations are affected, thereby causing cooling or heating of the TLS, depending on the interval. ...
The basic model studied here is that of a two-level system (TLS), whose energy is periodically modulated while the system is coupled to thermal baths. ...
of the system operator S(t) is evaluated in the interaction picture. ...
doi:10.1016/bs.aamop.2015.07.002
fatcat:ji2m7jptx5bzbn5vd4ixpzv4ci
Towards a maturity model for crypto-agility assessment
[article]
2022
arXiv
pre-print
CAMM consists of five levels, for each level a set of requirements have been formulated based on literature review. ...
Based on our model, the crytographic agility of an IT landscape can be systematically measured and improved step by step. ...
Example Legacy algorithms in TLS 1.3 may only be used to ensure backward compatibility with TLS 1.2. ...
arXiv:2202.07645v2
fatcat:klxt7fusv5fszlz6cjrnt2uqty
Quantum Zeno effect for open quantum systems
[article]
2020
arXiv
pre-print
We prove the quantum Zeno effect in open quantum systems whose evolution, governed by quantum dynamical semigroups, is repeatedly and frequently interrupted by the action of a quantum operation. ...
We also prove the existence of a novel strong quantum Zeno limit for quantum operations for which a certain spectral gap assumption, which all previous results relied on, is lifted. ...
For open quantum systems, one can not only perform projective measurements but also generalized measurements. ...
arXiv:2010.04121v1
fatcat:joifqaztrvbfjboi3iw3zuev54
Quantum Zeno Effect in Open Quantum Systems
2021
Annales de l'Institute Henri Poincare. Physique theorique
In addition, we establish, for the first time, the existence of a quantum Zeno limit for open quantum systems in the case of unbounded generators. ...
We also prove the existence of a novel strong quantum Zeno limit for quantum operations for which a certain spectral gap assumption, which all previous results relied on, is lifted. ...
Wolf for getting us interested in the quantum Zeno effect under quantum operations. R.S. would like to thank Niklas Galke for helpful discussions. ...
doi:10.1007/s00023-021-01075-8
fatcat:kjnyvryp6rd6liruzu3erpg24q
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem
2015
2015 IEEE Symposium on Security and Privacy
with the design of TLS 1.3. ...
Our performance data demonstrates that R-LWE is a plausible candidate for providing post-quantum key exchange security in TLS. ...
doi:10.1109/sp.2015.40
dblp:conf/sp/BosCNS15
fatcat:b4tg74fd6vbppdq7d23j77kipq
« Previous
Showing results 1 — 15 out of 868 results