Filters








5,542 Hits in 4.9 sec

Transitioning to a Quantum-Resistant Public Key Infrastructure [chapter]

Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
2017 Lecture Notes in Computer Science  
In addition to creating post-quantum primitives, we must also plan how to adapt the cryptographic infrastructure for the transition, especially in scenarios such as public key infrastructures (PKIs) with  ...  To ensure uninterrupted cryptographic security, it is important to begin planning the transition to post-quantum cryptography.  ...  Transitions involving public key infrastructure have a more mixed record: browser vendors and CAs have had a long transition period from SHA-1 to SHA-2 in certificates, with repeated delay of deadlines  ... 
doi:10.1007/978-3-319-59879-6_22 fatcat:ymxug5gmyzhw5fsgeehpx2no3u

Transitioning to a Hyperledger Fabric Quantum-Resistant Classical Hybrid Public Key Infrastructure

Robert Campbell
2019 The Journal of British Blockchain Association  
This work also proposes that qTESLA's public keys be used to create a quantum-resistant-classical hybrid PKI near-term replacement.  ...  Hyperledger Fabric (HLF) is a permissioned, blockchain designed by IBM and uses Public Key Infrastructure (PKI), for digital signatures, and digital identities (X.509 certificates), which are critical  ...  Therefore, the author believes that qTESLA offers a possible near-term "Hybrid Quantum Resistant-Classical Public Key Infrastructure," a solution with a significant reduction in its public key size.  ... 
doi:10.31585/jbba-2-2-(4)2019 fatcat:mmzq3d42bzbwhd5fw3dky5aciu

X.509-Compliant Hybrid Certificates for the Post-Quantum Transition

Nina Bindel, Johannes Braun, Luca Gladiator, Tobias Stöckert, Johannes Wirth
2019 Journal of Open Source Software  
This enables a stepwise transition to post-quantum secure and hybrid algorithms without the risk of incompatibility problems.  ...  We provide an X.509-standard-compliant Java implementation of hybrid certificates, which enable the parallel usage of two independent cryptographic schemes within public key infrastructures and related  ...  Motivation and statement of need Public Key Infrastructures (PKIs) support the use of public-key cryptography by handling keys and providing public-key certificates.  ... 
doi:10.21105/joss.01606 fatcat:zbxrm345szfzrggdwj5gckk7ge

Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility [article]

David Ott, Christopher Peikert, other workshop participants
2019 arXiv   pre-print
Failure to transition before sufficiently powerful quantum computers are realized will jeopardize the security of public key cryptosystems which are widely deployed within communication protocols, digital  ...  Specifically, widely used RSA, ECDSA, ECDH, and DSA cryptosystems will need to be replaced by post-quantum cryptography (PQC) alternatives (also known as quantum-resistant or quantum-safe cryptography)  ...  to be quantum resistant.  ... 
arXiv:1909.07353v1 fatcat:myqmftbsifh43g3ql7ejj4kpoi

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era [article]

S.E. Yunakovsky, M. Kot, N.O. Pozhar, D. Nabokov, M.A. Kudinov, A. Guglya, E.O. Kiktenko, E. Kolycheva, A. Borisov, A.K. Fedorov
2021 arXiv   pre-print
Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols.  ...  In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments.  ...  In the terms of Mosca's theorem this requires to the minimization of the transition time to quantum resistant solutions.  ... 
arXiv:2105.01324v1 fatcat:arjw4voxbnh4tcah74bvwkshhm

Practical cryptographic strategies in the post-quantum era

I.S. Kabanov, R.R. Yunusov, Y.V. Kurochkin, A.K. Fedorov
2018 arXiv   pre-print
We review new frontiers in information security technologies in communications and distributed storage technologies with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography  ...  Complete transition of all encryption system users to quantum resistant encryption will not happen in a moment, new standards and products resistant to quantum computing techniques will evolve along the  ...  As well as classical public-key cryptography primitives these methods are fully non-resistant to "store now -decrypt later" paradigm, because of an existence of the possibility to invent a "post-quantum  ... 
arXiv:1703.04285v2 fatcat:gujjx5okzndizegkoijy2uqcea

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

Sergey E. Yunakovsky, Maxim Kot, Nikolay Pozhar, Denis Nabokov, Mikhail Kudinov, Anton Guglya, Evgeniy O. Kiktenko, Ekaterina Kolycheva, Alexander Borisov, Aleksey K. Fedorov
2021 EPJ Quantum Technology  
In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments.  ...  We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions.  ...  In the terms of Mosca's theorem this requires to the minimization of the transition time to quantum resistant solutions.  ... 
doi:10.1140/epjqt/s40507-021-00104-z fatcat:vgnotzouqbgsze3frbd72x3ibm

Quantum networks: where should we be heading?

Masahide Sasaki
2017 Quantum Science and Technology  
using public key cryptography, symmetric key PUBLISHED  ...  At present networking of QKD is made by using trusted nodes in such a way that a key is relayed up to a terminal by OTP encapsulation, spending the keys generated in neighbouring QKD links [1-6].  ...  Acknowledgements The author thanks M Fujiwara, M Takeoka, K Yoshino, A Tajima, A Tomita, K Tamaki, J Braun, J Buchmann, D Demirel, M Geihs, S Moriai, A Waseda and W Ogata for their collaborations.  ... 
doi:10.1088/2058-9565/aa6994 fatcat:oo2hckq7fvbvhpragiwrvv2umm

On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions [article]

Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong
2020 arXiv   pre-print
Therefore, the transition from classical primitives to quantum-safe primitives is indispensable to ensure the overall security of data en route.  ...  Currently, secure and reliable data communication in IoT is based on public-key cryptosystems such as Elliptic Curve Cryptosystem (ECC).  ...  To authenticate the relation of a one-time public key with the global public key (also referred to as tree root), signatures keep on appending a sequence of intermediate tree nodes, called authentication  ... 
arXiv:2004.10435v1 fatcat:bx6g5lidlbatpdgd3omwfk22i4

The Need for Cyber Resilient Enterprise Distributed Ledger Risk Management Framework

Robert E. Campbell, Sr.
2020 The Journal of British Blockchain Association  
The most significant existing attack vector for enterprise DLs is the public key infrastructure (PKI), which is fundamental in securing the Internet and enterprise DLs and is a core component of authentication  ...  operate without clear or public plans and strategies to migrate safely and timely to post-quantum cryptography (PQC).  ...  Therefore, the author believes that now is the time to test possible near-term "Hybrid Quantum Resistant Classical Public Key Infrastructure," a solution with an aim of seeking reductions in public-key  ... 
doi:10.31585/jbba-3-1-(5)2020 fatcat:v2ywafhtozhppgfnkknmuvkcq4

FPGA-based Digital Quantum Coprocessor

Valerii Hlukhov, Lviv Polytechnic National University, Computer Engineering Department, Bohdan Havano
2018 Advances in Cyber-Physical Systems  
Public Key Infrastructure: A set of defacto standards and protocols used to distribute and manage cryptographic keys using certificates.  ...  There are two types of cryptography that are often referred to as "symmetric key" and "public key" cryptography: Public Key Infrastructure typically this takes the form of a Certificate Authority (CA)  ...  SWIFT operates a Public Key Infrastructure to digitally sign and encrypt messages sent over SWIFTNet.  ... 
doi:10.23939/acps2018.02.067 fatcat:7txboogyr5f5vgc5c5zzbovv34

Post-Quantum Cryptography—A New Opportunity and Challenge for the Mathematics Community

Jintai Ding, Daniel Smith-Tone
2017 Notices of the American Mathematical Society  
A large international community has emerged to address this issue in the hope that our public-key infrastructure may remain intact by utilizing new quantum-resistant primitives.  ...  In August 2015 the National Security Agency published a webpage announcing preliminary plans for transitioning to quantum-resistant algorithms (www.iad.gov /iad/programs/iad-initiatives/cnsa-suite.cfm)  ...  Is a quantum computer actually feasible? See "The Quantum Computer Puzzle" by Gil Kalai in the May 2016 issue of the Notices.  ... 
doi:10.1090/noti1546 fatcat:s2ixtprmr5ctfpk336wwn4fh4e

Quantum-Resistant Network for Classical Client Compatibility

Te-Yuan Lin, Chiou-Shann Fuh
2021 Information Technology and Control  
computers.In transitioning to a mature quantum world, developing a quantum-resistant mechanism becomes a stringentproblem.  ...  Quantum computing is no longer a thing of the future. Shor's algorithm proved that a quantum computer couldtraverse key of factoring problems in polynomial time.  ...  Acknowledgement We sincerely thank National Taiwan University-IBM Q Hub, who sponsored the state-of-the-art quantum computers and application interfaces to contribute this research as a great testing platform  ... 
doi:10.5755/j01.itc.50.2.27570 fatcat:o54oxyae75cydoiuyf6kf2esua

On PQC Migration and Crypto-Agility [article]

Alexander Wiesmaier
2021 arXiv   pre-print
We use this as starting point for a community project to keep track of the ongoing efforts and the state of the art in this field.  ...  In consequence, it is difficult to judge for both individual application scenarios and on a global scale, whether all (known) challenges have been addressed respectively or what their current state is.  ...  RFC6916 formalizes the migration process for algorithm suites in the Resource Public Key Infrastructure (RPKI) [51] .  ... 
arXiv:2106.09599v1 fatcat:itr6zdltirg2ri3ismbeo7vtiq

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
As we move into a new decade, the global world of Intelligent Infrastructure (II) services integrated into the Internet of Things (IoT) are at the forefront of technological advancements.  ...  A practical case study on the Internet of Vehicles (IoV) is presented to demonstrate how PETs can be applied in reality.  ...  The scheme uses hybrid encryption that consists of a lattice-based CCA2-secure public-key KEM and an AES-256; the size of the public key is 93 kB. 6) QUANTUM-RESISTANT HOMOMORPHIC ENCRYPTION Lattices  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu
« Previous Showing results 1 — 15 out of 5,542 results