_index.html 2.59 KB
Newer Older
unknown's avatar
unknown committed
1
2
3
4
+++
title = "Cryptographic Migration & Agility"
linkTitle = "Cryptographic Migration & Agility"
+++
Nouri-Alnahawi's avatar
Nouri-Alnahawi committed
5

unknown's avatar
unknown committed
6
{{< blocks/cover title="Cryptographic Migration & Agility" image_anchor="top" height="full" color="dark" >}}
Nouri-Alnahawi's avatar
Nouri-Alnahawi committed
7

unknown's avatar
unknown committed
8
<div class="mx-auto">
Nouri-Alnahawi's avatar
Nouri-Alnahawi committed
9
	<a class="btn btn-lg btn-light mr-3 mb-4" href="{{< relref "/docs" >}}">
10
		Content
unknown's avatar
unknown committed
11
12
		<i class="fas fa-arrow-alt-circle-right ml-2"></i>
	</a>
Nouri Alnahawi's avatar
Nouri Alnahawi committed
13
	<a class="btn btn-lg btn-dark mr-3 mb-4" href="https://arxiv.org/abs/2106.09599">
unknown's avatar
unknown committed
14
		Original Paper <i class="fas fa-book ml-2 "></i>
Nouri Alnahawi's avatar
Nouri Alnahawi committed
15
	</a>
Nouri-Alnahawi's avatar
Nouri-Alnahawi committed
16
	<p class="display-4">An open community site for sharing any relevant research, findings, and solutions on PQC migration and cryptographic agility.</p>
Nouri-Alnahawi's avatar
Nouri-Alnahawi committed
17
	{{< blocks/link-down color="white" >}}
unknown's avatar
unknown committed
18
19
20
21
</div>
{{< /blocks/cover >}}

{{< blocks/lead color="primary" >}}
Nouri-Alnahawi's avatar
Nouri-Alnahawi committed
22
Post-quantum cryptographic schemes have been under development for several years. Very soon there will be standardized post-quantum algorithms replacing the previous standards, which will eventually become obsolete. In order for quantum-resistant cryptographic Measures to be utilized, one needs more than simply developing secure post-quantum algorithms. The migration towards PQC poses great challenges on different levels. Those are not only restricted to the integration into existing protocols, but also include performance issues such as hardware specifications and memory usage, and especially the uncertainty of long term security of the new algorithm families. Moreover, a major challenge lies within finding suitable means of communicating and negotiating new algorithms and protocol parameters between different IT-systems. This leads to the urgent need for establishing the concept of crypto-agility, so as to be prepared for the rapid changes of cryptography, and insure the compatibility in all possible scenarios and settings.
unknown's avatar
unknown committed
23
24
25
{{< /blocks/lead >}}

{{< blocks/section color="dark" >}}
Nouri-Alnahawi's avatar
Nouri-Alnahawi committed
26
27
{{% blocks/feature icon="fas fa-user-secret" title="Applied Cyber-Security" url="https://fbi.h-da.de/en/research/research-groups/applied-cyber-security-darmstadt" %}}
Applied Cyber-Security research group at Darmstadt University of Applied Sciences
unknown's avatar
unknown committed
28
29
{{% /blocks/feature %}}

Nouri-Alnahawi's avatar
Nouri-Alnahawi committed
30
31
{{% blocks/feature icon="fa-user-shield" title="User-Centered Security" url="https://fbi.h-da.de/en/research/research-groups/user-centered-security" %}}
User-Centered Security research group at Darmstadt University of Applied Sciences
unknown's avatar
unknown committed
32
33
34
{{% /blocks/feature %}}

{{% blocks/feature icon="fab fa-gitlab" title="Contributions Welcome!" url="https://code.fbi.h-da.de/cspub/cma" %}}
Nouri-Alnahawi's avatar
Nouri-Alnahawi committed
35
Send a Pull Request to our repository on **GitLab** to contribute to this site
unknown's avatar
unknown committed
36
37
38
{{% /blocks/feature %}}

{{< /blocks/section >}}