Encouraging the Adoption of Post-Quantum Hybrid Key Exchange in Network Security

被引:1
|
作者
Giron, Alexandre Augusto [1 ,2 ]
机构
[1] Fed Univ Santa Catarina UFSC, Informat & Stat Dept INE, Grad Program Comp Sci, Florianopolis, SC, Brazil
[2] Fed Univ Technol Parana UTFPR, Toledo, PR, Brazil
来源
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT II | 2021年 / 399卷
关键词
Post-quantum cryptography; Hybrid key exchange; Network security;
D O I
10.1007/978-3-030-90022-9_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Post-Quantum Cryptography (PQC) is under standardization, and a transition from "classic" cryptography to PQC is likely to occur. Combining classic cryptography with PQC in a Hybrid form can ease such transition. In this context, this research aims at the challenges of designing a Post-Quantum Hybrid Key Exchange (KEX). The focus here is on the hybrid forms and in their adoption in widely-used network protocols. The methodology of this research includes: (1) a systematic review of the challenges of the design of Hybrid KEX; (2) to evaluate proposals in network protocols (such as TLS 1.3); and (3) to provide security analysis for the proposals. It is believed that these hybrids will contribute to the evolution of network security: by giving protection against attackers with or without quantum capabilities but also minimizing possible compatibility issues.
引用
收藏
页码:363 / 371
页数:9
相关论文
共 50 条
  • [31] RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices
    Lee, Joohee
    Kim, Duhyeong
    Lee, Hyungkyu
    Lee, Younho
    Cheon, Jung Hee
    IEEE ACCESS, 2019, 7 : 2080 - 2091
  • [32] Network coding-based post-quantum cryptography
    Cohen A.
    D’Oliveira R.G.L.
    Salamatian S.
    Médard M.
    IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 49 - 64
  • [33] Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
    Nosouhi, Mohammad Reza
    Shah, Syed W.
    Pan, Lei
    Zolotavkin, Yevhen
    Nanda, Ashish
    Gauravaram, Praveen
    Doss, Robin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2160 - 2174
  • [34] Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms
    Raavi, Manohar
    Wuthier, Simeon
    Chandramouli, Pranav
    Balytskyi, Yaroslav
    Zhou, Xiaobo
    Chang, Sang-Yoon
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2021, PT II, 2021, 12727 : 424 - 447
  • [35] Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
    Farooq, Sana
    Altaf, Ayesha
    Iqbal, Faiza
    Thompson, Ernesto Bautista
    Vargas, Debora Libertad Ramirez
    Diez, Isabel de la Torre
    Ashraf, Imran
    SENSORS, 2023, 23 (12)
  • [36] Implementing Butterfly Key Expansion Using Post-Quantum Algorithms
    Salman, Ahmad
    Blankinship, Zachary
    PROCEEDINGS OF SEVENTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2022, VOL 1, 2023, 447 : 507 - 516
  • [37] Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography
    Ricci, Sara
    Dobias, Patrik
    Malina, Lukas
    Hajny, Jan
    Jedlicka, Petr
    IEEE ACCESS, 2024, 12 : 23206 - 23219
  • [38] Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography
    Yi, Haibo
    JOURNAL OF GRID COMPUTING, 2023, 21 (02)
  • [39] Non-Interactive Blind Signatures: Post-Quantum and Stronger Security
    Baldimtsi, Foteini
    Cheng, Jiaqi
    Goyal, Rishab
    Yadav, Aayush
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT II, 2025, 15485 : 70 - 104
  • [40] Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
    Khan, Muhammad Asghar
    Javaid, Shumaila
    Mohsan, Syed Agha Hassnain
    Tanveer, Muhammad
    Ullah, Insaf
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 6849 - 6871