Implementing Post-quantum Cryptography for Developers

被引:0
|
作者
Hekkala J. [1 ]
Muurman M. [1 ]
Halunen K. [2 ,3 ]
Vallivaara V. [1 ]
机构
[1] VTT Technical Research Centre of Finland, Kaitoväylä 1, Oulu
[2] Faculty of Information Technology and Electrical Engineering, University of Oulu, Oulu
[3] Department of Military Technology, National Defence University, Helsinki
关键词
C++; Lattice cryptography; Post-quantum cryptography; Programming library;
D O I
10.1007/s42979-023-01724-1
中图分类号
学科分类号
摘要
Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and Technology has recently reached the end of the third round of post-quantum standardization process and has published three digital signatures and one key encapsulation mechanism for standardization. Three of the chosen algorithms are based on lattices. When implementing complex cryptographic algorithms, developers commonly use cryptographic libraries in their solutions to avoid mistakes. However, most of the open-source cryptography libraries do not yet have post-quantum algorithms integrated in them. We chose a C++ cryptography library, Crypto++, and created a fork where we integrated four lattice-based post-quantum algorithms. We analyzed the challenges in the process as well as the performance, correctness and security of the implemented algorithms. The performance of the integrated algorithms was overall good, but the integration process had its challenges, many of which were caused by the mathematical complexity of lattice-based algorithms. Different open-source implementations of post-quantum algorithms will be essential to their easier use for developers. Usability of the implementations is also important to avoid possible mistakes when using the algorithms. © 2023, The Author(s).
引用
收藏
相关论文
共 50 条
  • [31] Homomorphic Encryption Based on Post-Quantum Cryptography
    Chen, Abel C. H.
    2023 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES, ICMLANT, 2023, : 56 - 60
  • [32] TPM-Based Post-Quantum Cryptography
    Paul, Sebastian
    Schick, Felix
    Seedorf, Jan
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [33] Faster Isogenies for Post-quantum Cryptography: SIKE
    Elkhatib, Rami
    Koziel, Brian
    Azarderakhsh, Reza
    TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 49 - 72
  • [34] US outlines shift to post-quantum cryptography'
    Banks, Michael
    PHYSICS WORLD, 2022, 35 (06)
  • [35] A Performance Evaluation of IPsec with Post-Quantum Cryptography
    Bae, Seungyeon
    Chang, Yousung
    Park, Hyeongjin
    Kim, Minseo
    Shin, Youngjoo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 249 - 266
  • [36] Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem
    Wang, Wen
    Szefer, Jakub
    Niederhagen, Ruben
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 371 - 371
  • [37] On Feasibility of Post-Quantum Cryptography on Small Devices
    Malina, Lukas
    Popelova, Lucie
    Dzurenda, Petr
    Hajny, Jan
    Martinasek, Zdenek
    IFAC PAPERSONLINE, 2018, 51 (06): : 462 - 467
  • [38] LETTERS FOR POST-QUANTUM CRYPTOGRAPHY STANDARD EVALUATION
    Ding, Jintai
    Mesnager, Sihem
    Wang, Lih-Chung
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2020, 14 (01) : I - I
  • [39] Post-quantum cryptography: lattice identification schemes
    Silva, Rosemberg
    Cayrel, Pierre-Louis
    Buchmann, Johannes
    PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 729 - 748
  • [40] Experimental authentication of quantum key distribution with post-quantum cryptography
    Wang, Liu-Jun
    Zhang, Kai-Yi
    Wang, Jia-Yong
    Cheng, Jie
    Yang, Yong-Hua
    Tang, Shi-Biao
    Yan, Di
    Tang, Yan-Lin
    Liu, Zhen
    Yu, Yu
    Zhang, Qiang
    Pan, Jian-Wei
    NPJ QUANTUM INFORMATION, 2021, 7 (01)