Commit 19c741c1 authored by Nouri-Alnahawi's avatar Nouri-Alnahawi
Browse files

update algorithms and contributors

parent 6e32e88d
Pipeline #74911 passed with stages
in 1 minute and 21 seconds
......@@ -8,8 +8,16 @@ weight: 10
---
This site was initiated by the research groups [Applied Cyber-Security](https://fbi.h-da.de/forschung/arbeitsgruppen/applied-cyber-security-darmstadt) and [User Centered Security](https://fbi.h-da.de/index.php?id=764) of [Darmstadt University of Applied Sciences](https://h-da.de/), funded by [ATHENE National Research Center for Applied Cybersecurity](https://www.athene-center.de).
A list of our kind contributors:
A list of the contributors:
| Name | Affiliation | Contribution |
|--------------------------------|-------------|--------------|
||||
|Alexander Wiesmaier|Darmstatdt University of Applied Sciences|Original Paper / Community Site|
|Alexander Zeier|MTG AG Darmstadt|Original Paper|
|Andreas Heinemann|Darmstatdt University of Applied Sciences|Original Paper|
|Dominik Heinz|Darmstatdt University of Applied Sciences|Community Site / Development |
|Julian Geißler|Darmstatdt University of Applied Sciences|Original Paper|
|Nouri Alnahawi|Darmstatdt University of Applied Sciences|Original Paper / Community Site / Development / Updates |
|Pia Bauspieß|Darmstatdt University of Applied Sciences|Original Paper|
|Robin Meunier|Darmstatdt University of Applied Sciences|PQC Algorithm Sepecifications |
|Tobias Grasmeyer|Darmstatdt University of Applied Sciences|Original Paper / Community Site / Development |
......@@ -14,21 +14,21 @@ The current state of PQC is represented by the ongoing [NIST PQC standardization
| Algorithm | Description | Type | NIST Round |
|-------------------------------------|-------------|------|------------|
| [BIKE]({{< ref "/bike" >}} "BIKE") | Bit flipping key encapsulation based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check) [[ABB+20]](../../refs#abb20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [BIKE]({{< ref "/bike" >}} "BIKE") | Bit flipping key-encapsulation based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check) [[ABB+20]](../../refs#abb20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [CRYSTALS-Dilithium]({{< ref "/dilithium" >}} "CRYSTALS-Dilithium") | Digital signature scheme based on the hardness of lattice problems over module lattices [[DKL+21]](../../refs#dkl21) | Digital Signature | Round 3 Finalist |
| [Falcon]({{< ref "/falcon" >}} "Falcon") | Lattice-based signature scheme based on the short integer solution problem (SIS) over NTRU lattices [[FHK+20]](../../refs#fhk20) | Digital Signature | Round 3 Finalist |
| [FrodoKEM]({{< ref "/frodo" >}} "FrodoKEM")| Key encapsulation from generic lattices [[NAB+20]](../../refs#nab20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [FrodoKEM]({{< ref "/frodo" >}} "FrodoKEM")| Key-encapsulation from generic lattices [[NAB+21]](../../refs#nab21) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [GeMSS]({{< ref "/gemss" >}} "GeMSS") | Multivariate signature scheme producing small signatures [[CFP+19]](../../refs#cfp19) | Digital Signature | Round Three Alternative |
| [HQC]({{< ref "/hqc" >}} "HQC") | Hamming quasi-cyclic code-based public key encryption scheme [[MAB+20]](../../refs#mab20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [HQC]({{< ref "/hqc" >}} "HQC") | Hamming quasi-cyclic code-based public-key encryption scheme [[MAB+21]](../../refs#mab21) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [CRYSTALS-Kyber]({{< ref "/kyber" >}} "KYBER")| IND-CCA2-secure key-encapsulation mechanism (KEM) based on hard problems over module lattices [[ABD+21]](../../refs#abd21)| Public-key Encryption and Key-establishment | Round 3 Finalist |
| [Classic McEliece]({{< ref "/mceliece" >}} "Classic McEliece") | Code-based public-key cryptosystem based on random binary Goppa codes [[CCU+20]](../../refs#ccu20) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [NTRU]({{< ref "/ntru" >}} "NTRU") | Public-key cryptosystem based on lattice-based cryptography [[CDH+19]](../../refs#cdh19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [NTRU-Prime]({{< ref "/prime" >}} "NTRU-Prime") | Small lattice-based key-encapsulation mechanism (KEM) [[BBC+20]](../../refs#bbc20) | Public-key Encryption and Key-establishment | Round 3 Alternative |
| [Picnic]({{< ref "/picnic" >}} "Picnic") | Digital signature algorithems based on the zero-knowledge proof system and symmetric key primitives [[CDG+17]](../../refs#cdg17) | Digital Signature | Round 3 Alternative |
| [Rainbow]({{< ref "/rainbow" >}} "Rainbow")| Public key cryptosystem based on the hardness of solving a set of random multivariate quadratic systems [[DS05]](../../refs#ds05) | Digital Signature | Round 3 Finalist |
| [SABER]({{< ref "/saber" >}} "SABER") | IND-CCA2-secure Key Encapsulation Mechanism (KEM) based on the hardness of the Module Learning With Rounding problem (MLWR) [[DKR+19]](../../refs#dkr19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [SIKE]({{< ref "/sike" >}} "SIKE")| Isogeny-based key encapsulation suite based on pseudo-random walks in supersingular isogeny graphs [[CCH+20]](../../refs#cch20) | Public-key Encryption and Key-establishment | Round 3 Alternative |
| [Picnic]({{< ref "/picnic" >}} "Picnic") | Digital signature algorithm based on the zero-knowledge proof system and symmetric key primitives [[CDG+17]](../../refs#cdg17) | Digital Signature | Round 3 Alternative |
| [Rainbow]({{< ref "/rainbow" >}} "Rainbow")| Public-key cryptosystem based on the hardness of solving a set of random multivariate quadratic systems [[DS05]](../../refs#ds05) | Digital Signature | Round 3 Finalist |
| [SABER]({{< ref "/saber" >}} "SABER") | IND-CCA2-secure key-encapsulation mechanism (KEM) based on the hardness of the module learning with rounding problem (MLWR) [[DKR+19]](../../refs#dkr19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [SIKE]({{< ref "/sike" >}} "SIKE")| Isogeny-based key-encapsulation suite based on pseudo-random walks in supersingular isogeny graphs [[CCH+20]](../../refs#cch20) | Public-key Encryption and Key-establishment | Round 3 Alternative |
| [SPHINCS+]({{< ref "/sphincs" >}} "SPHINCS+") | A stateless hash-based signature scheme [[BHK+19]](../../refs#bhk19) | Digital Signature | Round 3 Alternative |
||
| [NewHope](https://newhopecrypto.org/) | Key-exchange protocol based on the Ring-Learning-with-Errors (Ring-LWE) problem [[ADPS16]](../../refs#adps16) | Public-key Encryption and Key-establishment | Round Two |
| [qTESLA](https://qtesla.org/) | Signature schemes based on the hardness of the decisional Ring Learning With Errors (R-LWE) problem [[ABB+20]](../../refs#abb20) | Digital Signature | Round Two |
| [qTESLA](https://qtesla.org/) | Signature scheme based on the hardness of the decisional ring learning with errors (R-LWE) problem [[ABB+20]](../../refs#abb20) | Digital Signature | Round Two |
......@@ -5,7 +5,4 @@ draft: false
type: docs
weight: 1
---
This is one algorithm page!
[BIKE](https://bikesuite.org/)
[BIKE](https://bikesuite.org/) is a bit flipping key encapsulation based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check).
......@@ -5,6 +5,4 @@ draft: false
type: docs
weight: 4
---
This is one algorithm page!
[FrodoKEM](https://frodokem.org/)
[FrodoKEM](https://frodokem.org/) is a key-encapsulation based on generic lattices.
......@@ -5,6 +5,4 @@ draft: false
type: docs
weight: 5
---
This is one algorithm page!
[GeMSS](https://www-polsys.lip6.fr/Links/NIST/GeMSS.html)
[GeMSS](https://www-polsys.lip6.fr/Links/NIST/GeMSS.html) is a multivariate signature scheme that produces small signatures.
......@@ -5,6 +5,4 @@ draft: false
type: docs
weight: 6
---
This is one algorithm page!
[HQC](http://pqc-hqc.org/)
[HQC](http://pqc-hqc.org/) is a Hamming quasi-cyclic code-based public-key encryption scheme.
......@@ -5,6 +5,4 @@ draft: false
type: docs
weight: 10
---
This is one algorithm page!
[Picnic](https://microsoft.github.io/Picnic/)
[Picnic](https://microsoft.github.io/Picnic/) digital signature algorithm based on the zero-knowledge proof system and symmetric key primitives.
......@@ -5,6 +5,4 @@ draft: false
type: docs
weight: 11
---
This is one algorithm page!
[NTRU-Prime](https://ntruprime.cr.yp.to/)
[NTRU-Prime](https://ntruprime.cr.yp.to/) is a small lattice-based key-encapsulation mechanism (KEM).
......@@ -5,6 +5,4 @@ draft: false
type: docs
weight: 14
---
This is one algorithm page!
[SIKE](https://sike.org/)
[SIKE](https://sike.org/) is an isogeny-based key-encapsulation suite based on pseudo-random walks in supersingular isogeny graphs.
......@@ -5,6 +5,6 @@ draft: false
type: docs
weight: 15
---
This is one algorithm page!
[SPHINCS+](https://sphincs.org/) a stateless hash-based signature scheme.
[SPHINCS+](https://sphincs.org/)
[Round 3 Submission](https://sphincs.org/data/sphincs+-round3-specification.pdf)
......@@ -225,8 +225,8 @@ weight: 8
###### [MAA+20]
[D. Moody, G. Alagic, D. C Apon, D. A. Cooper, Q. H. Dang, J. M. Kelsey, Y.Liu, C. A. Miller, R. C. Peralta, R. A. Perlner, A. Y. Robinson, D. C. Smith-Tone,and J. Alperin-Sheriff. 2020. Status report on the second round of the NISTpost-quantum cryptography standardization process.](https://doi.org/10.6028/NIST.IR.8309)
###### [MAB+20]
[C. Aguilar Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, E. Persichetti, G. Zémor, and I. C. Bourges. Hamming quasi-cyclic (hqc). NIST PQC Round, 3, 2020](https://pqc-hqc.org/doc/hqc-specification_2020-10-01.pdf)
###### [MAB+21]
[C. Aguilar Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, E. Persichetti, G. Zémor, and I. C. Bourges. Hamming quasi-cyclic (hqc). NIST PQC Round, 3, 2021](http://pqc-hqc.org/doc/hqc-specification_2021-06-06.pdf)
###### [Mas02]
[S. Maseberg. Fail-Safe-Konzept für Public-Key-Infrastrukturen. PhDthesis, 2002.](http://tuprints.ulb.tu-darmstadt.de/246/)
......@@ -249,8 +249,8 @@ weight: 8
###### [MW20]
[K. Mindermann and S. Wagner. 2020. Fluid Intelligence Doesn’t Matter! Effectsof Code Examples on the Usability of Crypto APIs. In2020 IEEE/ACM 42ndInternational Conference on Software Engineering: Companion Proceedings (ICSE-Companion). 306–307.](https://arxiv.org/abs/2004.03973)
###### [NAB+20]
[M. Naehrig, E. Alkim, J. W Bos, L. Ducas, K. Easterbrook, B. LaMacchia, P. Longa,I. Mironov, V. Nikolaenko, C. Peikert, et al.2020. Frodokem learning with errorskey encapsulation.NIST PQC Round3 (2020)](https://frodokem.org/files/FrodoKEM-specification-20171130.pdf)
###### [NAB+21]
[M. Naehrig, E. Alkim, J. W Bos, L. Ducas, K. Easterbrook, B. LaMacchia, P. Longa,I. Mironov, V. Nikolaenko, C. Peikert, et al.2020. Frodokem learning with errorskey encapsulation.NIST PQC Round3 (2021)](https://frodokem.org/files/FrodoKEM-specification-20210604.pdf)
###### [NIWA17]
[Niederhagen, R., & Waidner, M. (2017). Practical Post-Quantum Cryptography. Fraunhofer White Paper, vol. ISSN, 2192-8169](https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Practical.PostQuantum.Cryptography_WP_FraunhoferSIT.pdf?_=1503992279)
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment