Filters








2,089 Hits in 3.1 sec

Post-Quantum Security Models for Authenticated Encryption [chapter]

Vladimir Soukharev, David Jao, Srinath Seshadri
2016 Lecture Notes in Computer Science  
A symmetric key encryption scheme E = (Encrypt, Decrypt) is indistinguishable under a quantum chosen message attack (IND-qCPA secure) if no efficient adversary A can win in the following game, except with  ...  A signature scheme S = (G , Sign, Ver ) is strongly unforgeable under a quantum chosen message attack (SUF-qCMA secure) if, for any efficient quantum algorithm A and any polynomial q, A's probability of  ...  David Jao Director CENTRE FOR APPLIED CRYPTOGRAPHIC RESEARCH (CACR) djao@uwaterloo.ca Isogeny-based authenticated encryption schemes We present an example of the quantum-resistant authenticated encryption  ... 
doi:10.1007/978-3-319-29360-8_5 fatcat:jomxbzcaynfffa2mo2emcc635u

Practical cryptographic strategies in the post-quantum era

I.S. Kabanov, R.R. Yunusov, Y.V. Kurochkin, A.K. Fedorov
2018 arXiv   pre-print
We review new frontiers in information security technologies in communications and distributed storage technologies with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography  ...  An approach concerning the selection of practical encryption technologies for enterprises with branched communication networks is introduced.  ...  That is why Alice and Bob use authenticated public channel for the post-processing procedure [10, 11] .  ... 
arXiv:1703.04285v2 fatcat:gujjx5okzndizegkoijy2uqcea

A voting scheme with post-quantum security based on physical laws [article]

Hua Dong, Li Yang
2018 arXiv   pre-print
In this paper, we propose a new post-quantum voting scheme based on physical laws by using encrypted no-key protocol to transmit message in the channel, which ensures the post-quantum security.  ...  In detail, we also rigorously demonstrate that the scheme achieves the post-quantum security and all properties necessary for voting scheme such as the completeness, robustness, privacy, eligibility, unreusability  ...  The Post-quantum Security of Encrypted No-key Protocol The post-quantum security of ENK protocol in ref. [29] is specifically analyzed from the perspective of physical limitation.  ... 
arXiv:1805.12480v1 fatcat:wokvwqjjsrbina4xce7m2l4xiu

Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world

John M. Schanck, William Whyte, Zhenfei Zhang
2016 Proceedings on Privacy Enhancing Technologies  
In doing so, we refine the notion of an authenticated and confidential channel establishment (ACCE) protocol and define pre-quantum, transitional, and post-quantum ACCE security.  ...  We propose a circuit extension handshake for Tor that is forward secure against adversaries who gain quantum computing capabilities after session negotiation.  ...  We also wish to thank: Aniket Kate for discussing potential improvements to our scheme, Douglas Stebila for several enlightening conversations, and the anonymous reviewers for their close readings and  ... 
doi:10.1515/popets-2016-0037 dblp:journals/popets/SchanckWZ16 fatcat:eylhs2de3nbbhguptw5te376he

Cybersecurity Challenges Associated with the Internet of Things in a Post-Quantum World

Ohood Althobaiti, Mischa Dohler
2020 IEEE Access  
In this study, we discuss techniques able to provide security in a post-quantum IoT.  ...  Specifically, we examine how the thirdgeneration partnership project (3GPP) IoT security solutions fair in a post-quantum environment.  ...  ACKNOWLEDGEMENT This study is part of this research project "Quantum-Resistant Cryptography for the Internet of Things based on Location-Based Lattices" at King's College London.  ... 
doi:10.1109/access.2020.3019345 fatcat:5h7ac7zngvazndjyhemkco6hhi

Efficient Post-Quantum TLS Handshakes using Identity-Based Key Exchange from Lattices

Utsav Banerjee, Anantha P. Chandrakasan
2020 ICC 2020 - 2020 IEEE International Conference on Communications (ICC)  
In this work, we build on the well-known latticebased DLP-IBE scheme to construct an ID-based certificateless authenticated key exchange for post-quantum Transport Layer Security (TLS) handshakes.  ...  levels, and show that our ID-based handshake is 3.7× more energy-efficient, thus highlighting the advantage of ID-based key exchange for post-quantum TLS.  ...  ACKNOWLEDGMENT The authors thank Texas Instruments for funding this work.  ... 
doi:10.1109/icc40277.2020.9148829 dblp:conf/icc/BanerjeeC20 fatcat:k4e5h4tfqrf4be3t3l2njgi2pe

Post-Quantum Secure Cryptographic Algorithms [article]

Xenia Bogomolec, Jochen Gerhard
2018 arXiv   pre-print
An overview on current developments in post quantum cryptography  ...  post-quantum security.  ...  Multivariate signature schemes provide the shortest signatures amongst post-quantum algorithms (GUI [20] 129 bit over GF (2) for a quantum security level of 80 bit).  ... 
arXiv:1809.00371v2 fatcat:nholvlircjavza5trvkx2iqdym

Securing Cloud - The Quantum Way [article]

Marmik Pandya
2015 arXiv   pre-print
knowledge of Quantum Mechanics and current advances in research in Quantum Computing, to provide a more secure architecture.  ...  This paper aims to look into basic security architecture in place currently and further it tries to introduce a new proposed security architecture for cloud computing environment, which makes use of the  ...  Another method for secure authentication on Cloud is using Kerberos. Many researchers have proposed a Kerberos-based model for secure data storage and secure authentication on the cloud.  ... 
arXiv:1512.02196v1 fatcat:vbmvlcjemveaxkaknvfeadqvny

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

Sergey E. Yunakovsky, Maxim Kot, Nikolay Pozhar, Denis Nabokov, Mikhail Kudinov, Anton Guglya, Evgeniy O. Kiktenko, Ekaterina Kolycheva, Alexander Borisov, Aleksey K. Fedorov
2021 EPJ Quantum Technology  
We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions.  ...  In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments.  ...  Acknowledgements We thank Bosch for providing the PKI scheme. Funding This work is supported by Bosch. Abbreviations  ... 
doi:10.1140/epjqt/s40507-021-00104-z fatcat:vgnotzouqbgsze3frbd72x3ibm

Resistant Blockchain Cryptography to Quantum Computing Attacks

Zhwan Mohammed Khalid, Shavan Askar
2021 Zenodo  
This paper reviews current scientists on quantum blockchain for such purposes. In addition, the major challenges are studied with the most important post-quantum blockchain systems.  ...  These algorithms challenge both public and hash encryption, causing blockchains to redesign and use quantum attack-tolerant cryptosystems; this produces cryptosystems which are considered post-quantum  ...  security primıtives (public-key security, Hash function) for which post-quantum primitives have been suggested in the section.  ... 
doi:10.5281/zenodo.4497731 fatcat:e55cprj7tfbedfxc4krs5jh4ry

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era [article]

S.E. Yunakovsky, M. Kot, N.O. Pozhar, D. Nabokov, M.A. Kudinov, A. Guglya, E.O. Kiktenko, E. Kolycheva, A. Borisov, A.K. Fedorov
2021 arXiv   pre-print
We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions.  ...  In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments.  ...  Acknowledgements We thank Bosch for providing the PKI scheme.  ... 
arXiv:2105.01324v1 fatcat:arjw4voxbnh4tcah74bvwkshhm

Breaking Symmetric Cryptosystems Using Quantum Period Finding [chapter]

Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia
2016 Lecture Notes in Computer Science  
First, we show that the most widely used modes of operation for authentication and authenticated encryption (e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security model.  ...  This is quite surprising compared to the situation with encryption modes: Anand et al. show that standard modes are secure with a quantum-secure PRF.  ...  Acknowledgements We would like to thank Thomas Santoli and Christian Schaffner for sharing an early stage manuscript of their work [41] , Michele Mosca for discussions and LTCI for hospitality.  ... 
doi:10.1007/978-3-662-53008-5_8 fatcat:zmmqzo3tn5ggdnuo7axmpc4n2a

An Authentication Protocol for Quantum Enabled Mobile Devices

Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel
2018 Zenodo  
An important part of this work is to propose a secure mutual authentication protocol over the quantum channel.  ...  Therefore, safety and security of such devices is also a major concern for us.  ...  Wireless Quantum Communication Channel In the basic model of quantum secure communication ecosystem, the photons emitted by Sender is used as a medium for building up the quantum communication channel.  ... 
doi:10.5281/zenodo.2022712 fatcat:rg7raezvqrebxdzrladpuzeuam

Breaking Symmetric Cryptosystems using Quantum Period Finding [article]

Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia
2016 arXiv   pre-print
First, we show that the most widely used modes of operation for authentication and authenticated encryption e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security model.  ...  This is quite surprising compared to the situation with encryption modes: Anand et al. show that standard modes are secure with a quantum-secure PRF.  ...  Acknowledgements We would like to thank Thomas Santoli and Christian Schaffner for sharing an early stage manuscript of their work [40] , Michele Mosca for discussions and LTCI for hospitality.  ... 
arXiv:1602.05973v3 fatcat:qmlnmfubvvhhzmsxmsku2qnjke

An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme

Sagarika Ghosh, Marzia Zaman, Gary Sakauye, Srinivas Sampalli
2021 Applied Sciences  
Therefore, researchers are developing various security schemes based on either quantum or post-quantum algorithms.  ...  However, the efficiency of quantum algorithms impacts the security of the post-quantum digital signature scheme.  ...  Acknowledgments: Thanks to Rohit Joshi of Cistel Technologies for valuable feedback. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app11052082 fatcat:cmxqynpw4nd3tmqw6nlz4grfbi
« Previous Showing results 1 — 15 out of 2,089 results