Implementing Post-quantum Cryptography for Developers

被引:0
|
作者
Hekkala J. [1 ]
Muurman M. [1 ]
Halunen K. [2 ,3 ]
Vallivaara V. [1 ]
机构
[1] VTT Technical Research Centre of Finland, Kaitoväylä 1, Oulu
[2] Faculty of Information Technology and Electrical Engineering, University of Oulu, Oulu
[3] Department of Military Technology, National Defence University, Helsinki
关键词
C++; Lattice cryptography; Post-quantum cryptography; Programming library;
D O I
10.1007/s42979-023-01724-1
中图分类号
学科分类号
摘要
Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and Technology has recently reached the end of the third round of post-quantum standardization process and has published three digital signatures and one key encapsulation mechanism for standardization. Three of the chosen algorithms are based on lattices. When implementing complex cryptographic algorithms, developers commonly use cryptographic libraries in their solutions to avoid mistakes. However, most of the open-source cryptography libraries do not yet have post-quantum algorithms integrated in them. We chose a C++ cryptography library, Crypto++, and created a fork where we integrated four lattice-based post-quantum algorithms. We analyzed the challenges in the process as well as the performance, correctness and security of the implemented algorithms. The performance of the integrated algorithms was overall good, but the integration process had its challenges, many of which were caused by the mathematical complexity of lattice-based algorithms. Different open-source implementations of post-quantum algorithms will be essential to their easier use for developers. Usability of the implementations is also important to avoid possible mistakes when using the algorithms. © 2023, The Author(s).
引用
收藏
相关论文
共 50 条
  • [1] Implementing Post-quantum Cryptography for Developers
    Hekkala, Julius
    Halunen, Kimmo
    Vallivaara, Visa
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 73 - 83
  • [2] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [3] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [4] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194
  • [5] Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware
    Gaj, Kris
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 359 - 364
  • [6] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [7] Applications of Post-Quantum Cryptography
    Bagirovs, Emils
    Provodin, Grigory
    Sipola, Tuomo
    Hautamaki, Jari
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 49 - 57
  • [8] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [9] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [10] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    PHYSICAL REVIEW APPLIED, 2024, 21 (04):