A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit <a rel="external noopener" href="https://dl.gi.de/bitstream/handle/20.500.12116/30617/CryptoDayMatters31-22-Loebenberger.pdf;jsessionid=C46F68F57F91B2CEB8BBCE14753CA2EB?sequence=1">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="Gesellschaft für Informatik e.V. / FG KRYPTO">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vl5k74j2ovhqbg6i2he5faafoy" style="color: black;">Krypto-Tag</a>
In 1994 mathematician Peter Shor developed an algorithm  requiring a quantum computer to find the prime factors of a composite number in much less time than needed today. Shor's algorithm is especially relevant for cryptography as many encryption schemes are based on the assumption that finding prime factors of a sufficiently large number is a computationally hard problem. A quantum computer that could run Shor's algorithm to attack today's cryptographic schemes does not yet exist, but<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18420/cdm-2019-31-22">doi:10.18420/cdm-2019-31-22</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/kryptotag/ChoGGGGGHL19.html">dblp:conf/kryptotag/ChoGGGGGHL19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ucttzkh3ovdntffjcx736fde3m">fatcat:ucttzkh3ovdntffjcx736fde3m</a> </span>
more »... advancements in the field of quantum computing suggest that such machines may become reality in the not too distant future [1, 9] . Indeed, first experimental implementations exist, noteably [4, 10] . A patient attacker may intercept today's network traffic and use a quantum computer in the future to break the cryptography employed  and the fear is that secret services are actively doing so  . Consequently, a new class of cryptographic schemes which are secure against attacks from quantum computers is being developed and standardized . Although secure against quantum attacks, those new methods typically come with severe limitations compared to the ones used today, such as huge keys or high computational requirements. For secure network communication, most VPN solutions use a key exchange method, like the Diffie-Hellman key exchange, or an asymmetric encryption scheme, like RSA, to derive a shared session secret. To make the protocols post-quantum safe not only the cryptographic primitives have to be replaced, but also the structure of the protocol has to be modified [11, 2] . In the IPsec protocol suite, the key exchange is handled by the IKEv2 protocol , which by design utilizes a single Diffie-Hellman key exchange. In the talk, we give an overview of existing quantum-resistant key exchange methods and their integration into the IKEv2 protocol to defy future quantum-based attacks. We discuss the progress in the NIST standardization efforts and explain how future implementations of the IPsec protocol suite can withstand quantum attacks. crypto day matters 31 (2019)
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200605074427/https://dl.gi.de/bitstream/handle/20.500.12116/30617/CryptoDayMatters31-22-Loebenberger.pdf;jsessionid=C46F68F57F91B2CEB8BBCE14753CA2EB?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/10/be1059b6146f4cc354a7b9f7fdf5305098828193.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18420/cdm-2019-31-22"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>