Performance of New Hope and CRYSTALS-Dilithium Postquantum Schemes in the Transport Layer Security Protocol

被引:1
|
作者
Francisco De Abiega-L'Eglisse, Alfonso [1 ]
Andrae Delgado-Vargas, Kevin [2 ]
Quetzalcoatl Valencia-Rodriguez, Fernando [3 ]
Gerardo Gonzalez-Quiroga, Victor [4 ]
Gallegos-Garcia, Gina [2 ]
Nakano-Miyatake, Mariko [1 ]
机构
[1] Inst Politecn Nacl, ESIME Culhuacan, Mexico City 04430, DF, Mexico
[2] Inst Po1itecn Nacl, CIC, Mexico City 07738, DF, Mexico
[3] Inst Politecn Nacl, ESCOM, Mexico City 07738, DF, Mexico
[4] Univ Nacl Autonoma Mexico, Fac Ciencias, Mexico City 04510, DF, Mexico
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Protocols; Servers; Cryptography; Computer architecture; Authentication; NIST; Standards; ARM architecture; NIST standardization process; postquantum schemes; transport layer security protocol;
D O I
10.1109/ACCESS.2020.3040324
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, there has been a notable amount of research on developing cryptographic schemes that are secure against both quantum and classical computers. In 2016, the National Institute of Standards and Technology (NIST) initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public key cryptographic schemes. This process originated because quantum computers can exploit quantum mechanical phenomena and solve mathematical problems that are difficult or intractable for classical computers. This kind of mathematical problem is the basis of secure public key cryptography. As a consequence, in a near future quantum computers will be able to break many of the public key schemes currently in use. However, the challenge is especially acute for devices with different architectures. They might not be well equipped to run the new standards and interoperate with existing communication protocols and networks. In this work, we analyze the performance of postquantum schemes in the transport layer security (TLS) protocol considering x86 as the server architecture and x86/ARM architectures as clients. All of them lack cloud computing or virtualized environments. Our analysis considers integrating the implementation of two cryptographic schemes that were successful in the second round of the postquantum standardization process, namely, Dilithium and New Hope. The performance of postquantum schemes in the TLS protocol is statistically analyzed in x86 and ARM architectures, giving the relationships, the effects and the survival of the analysis.
引用
收藏
页码:213968 / 213980
页数:13
相关论文
共 49 条
  • [1] Evaluating the Security of CRYSTALS-Dilithium in the Quantum Random Oracle Model
    Jackson, Kelsey A.
    Miller, Carl A.
    Wang, Daochen
    ADVANCES IN CRYPTOLOGY, PT VI, EUROCRYPT 2024, 2024, 14656 : 418 - 446
  • [2] Evaluating the Security of CRYSTALS-Dilithium in the Quantum Random Oracle Model
    Jackson, Kelsey A.
    Miller, Carl A.
    Wang, Daochen
    ADVANCES IN CRYPTOLOGY, PT VII, EUROCRYPT 2024, 2024, 14657 : 418 - 446
  • [3] High-Performance Hardware Implementation of CRYSTALS-Dilithium
    Beckwith, Luke
    Duc Tri Nguyen
    Gaj, Kris
    2021 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (ICFPT), 2021, : 250 - 259
  • [4] A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium
    Zhao C.
    Zhang N.
    Wang H.
    Yang B.
    Zhu W.
    Li Z.
    Zhu M.
    Yin S.
    Wei S.
    Liu L.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2022 (01): : 270 - 295
  • [5] Sparse Polynomial Multiplication-based High-Performance Hardware Implementation for CRYSTALS-Dilithium
    Zhao, Hang
    Zhao, Cankun
    Zhu, Wenping
    Yang, Bohan
    Wei, Shaojun
    Liu, Leibo
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 150 - 159
  • [6] SECURITY MECHANISMS IN A TRANSPORT LAYER PROTOCOL
    VOYDOCK, VL
    KENT, ST
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1984, 8 (5-6): : 433 - 449
  • [7] High-performance and Configurable SW/HW Co-design of Post-quantum Signature CRYSTALS-Dilithium
    Mao, Gaoyu
    Chen, Donglong
    Li, Guangyan
    Dai, Wangchen
    Sanka, Abdurrashid Ibrahim
    Koc, Cetin Kaya
    Cheung, Ray C. C.
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2023, 16 (03)
  • [8] New Transport Layer Security using Metaheuristics and New Key Exchange Protocol
    Kaddouri, Mohamed
    Bouhdadi, Mohammed
    Kaddouri, Zakaria
    Guerchi, Driss
    Echandouri, Bouchra
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 586 - 591
  • [9] New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation
    Obaidat, Mohammad S.
    Sundararajan, Mukund
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (12) : 1941 - 1949
  • [10] Transport Layer Security Protocol in Telnet.
    Mahmood, HB
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1033 - 1037