diff --git a/content/background.jpg b/content/background.jpg deleted file mode 100644 index 60a2f0f64a3acc749d83ef6457c3f90fbfc7615a..0000000000000000000000000000000000000000 Binary files a/content/background.jpg and /dev/null differ diff --git a/content/docs/List_Contributors.md b/content/docs/List_Contributors.md deleted file mode 100644 index 1f3f2e643ef7f8d30e9720a5d5cd215a8ce19f9b..0000000000000000000000000000000000000000 --- a/content/docs/List_Contributors.md +++ /dev/null @@ -1,15 +0,0 @@ ---- -title: "Contributors" -linktitle: "Contributors" -date: 2021-05-05T22:18:28+02:00 -draft: false -type: docs -weight: 10 ---- -This site was initiated by the research groups [Applied Cyber-Security](https://fbi.h-da.de/forschung/arbeitsgruppen/applied-cyber-security-darmstadt) and [User Centered Security](https://fbi.h-da.de/index.php?id=764) of [Darmstadt University of Applied Sciences](https://h-da.de/), funded by [ATHENE National Research Center for Applied Cybersecurity](https://www.athene-center.de). - -A list of our kind contributors: - -| Name | Affiliation | Contribution | -|--------------------------------|-------------|--------------| -|||| diff --git a/content/docs/Mindmap.md b/content/docs/Mindmap.md deleted file mode 100644 index 037bd78ee84d2460bcddc645b5ab3008a680e753..0000000000000000000000000000000000000000 --- a/content/docs/Mindmap.md +++ /dev/null @@ -1,12 +0,0 @@ ---- -title: "Categorization Scheme" -linktitle: "Categorization Scheme" -date: 2021-05-05T22:20:34+02:00 -draft: false -type: docs -weight: 2 -menu: - main: - weight: 2 ---- -{{< mindmap >}} diff --git a/content/docs/_index.md b/content/docs/_index.md deleted file mode 100644 index 13c03d47cf6a45272d4d2aa63a808a5ce3a07a20..0000000000000000000000000000000000000000 --- a/content/docs/_index.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "Cryptographic Migration & Agility" -linktitle: "Cryptographic Migration & Agility" -date: 2021-05-05T22:20:34+02:00 -draft: false -type: docs ---- -An open community site for sharing any relevant research, findings, and solutions on PQC migration and cryptographic agility. diff --git a/content/docs/about.md b/content/docs/about.md deleted file mode 100644 index 5ad6d783724bacc921d644772ad8ce6c16e00318..0000000000000000000000000000000000000000 --- a/content/docs/about.md +++ /dev/null @@ -1,12 +0,0 @@ ---- -title: "About Cryptographic Migration & Agility" -linktitle: "About Cryptographic Migration & Agility" -date: 2021-05-05T22:17:54+02:00 -draft: false -type: docs -weight: 1 -menu: - main: - weight: 1 ---- -Post-quantum cryptographic schemes have been under development for several years. Very soon there will be standardized post-quantum algorithms replacing the previous standards, which will eventually become obsolete. In order for quantum-resistant cryptographic Measures to be utilized, one needs more than simply developing secure post-quantum algorithms. The migration towards PQC poses great challenges on different levels. Those are not only restricted to the integration into existing protocols, but also include performance issues such as hardware specifications and memory usage, and especially the uncertainty of long term security of the new algorithm families. Moreover, a major challenge lies within finding suitable means of communicating and negotiating new algorithms and protocol parameters between different IT-systems. This leads to the urgent need for establishing the concept of crypto-agility, so as to be prepared for the rapid changes of cryptography, and insure the compatibility in all possible scenarios and settings. diff --git a/content/docs/agility/_index.md b/content/docs/agility/_index.md deleted file mode 100644 index b034e58540abe8e868928ded21e74d835780c266..0000000000000000000000000000000000000000 --- a/content/docs/agility/_index.md +++ /dev/null @@ -1,9 +0,0 @@ ---- -title: "State of Agility" -linktitle: "State of Agility" -date: 2021-05-05T22:35:41+02:00 -draft: false -type: docs -weight: 5 ---- -Aspects regarding the notion of cryptographic agility diff --git a/content/docs/agility/development.md b/content/docs/agility/development.md deleted file mode 100644 index e91440de876c827fbc6fd49f82c571239cd3b816..0000000000000000000000000000000000000000 --- a/content/docs/agility/development.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -title: "Development Considerations" -linktitle: "Development Considerations" -date: 2021-05-06T00:12:02+02:00 -draft: false -type: docs -weight: 2 ---- -- Research on CA mechanism - - [On the importance of cryptographic agility for industrial automation](https://www.degruyter.com/document/doi/10.1515/auto-2019-0019/html) This work motivates cryptographic agility by discussing the threat of quantum computers to modern cryptography [[PN19]](../../refs#pn19) - - [Security issues on the CNG cryptography library (Cryptography API: Next Generation)](https://ieeexplore.ieee.org/document/6603762) Next Generation from Microsoft to exchange cryptographic algorithms without any change to the code of the program [[LLP+13]](../../refs#llp13) - - [API Usability of Stateful Signature Schemes](https://link.springer.com/chapter/10.1007/978-3-030-26834-3_13) Easy-to-use API design for stateful signature schemes [[ZWH19]](../../refs#zwh19) -- CA as design principle - - [PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks](https://arxiv.org/abs/2010.06571) Proposes a redesign of Fabric's credential-management procedures and related specifications in order to incorporate hybrid digital signatures, protecting against both classical and quantum attacks using one classical and one quantum-safe signature [[HPDM20]](../../refs#hpdm20) - - [Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems](http://www.thinkmind.org/index.php?view=article&articleid=vehicular_2015_1_30_30028) This paper proposes a multi-domain PKI architecture for intelligent transportation systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, today [[UWK15]](../../refs#uwk15) -- Eval crypto libs - - [Comparing the Usability of Cryptographic APIs](https://ieeexplore.ieee.org/document/7958576) This paper is the first to examine both how and why the design and resulting usability of different cryptographic libraries affects the security of code written with them [[ABF+17]](../../refs#abf17) -- Eval code examples for crypto libs - - [Usability and Security Effects of Code Examples on Crypto APIs](https://ieeexplore.ieee.org/document/8514203) Platform for cryptographic code examples that improves the usability and security of created applications by non security experts [[MW18]](../../refs#mw18) - - [Fluid Intelligence Doesn't Matter! Effects of Code Examples on the Usability of Crypto APIs](https://arxiv.org/abs/2004.03973) Researches whether similarity and Gf also have an effect in the context of using cryptographic APIs [[MW20]](../../refs#mw20) -- Eval docum. system for crypto libs - - [Zur Benutzbarkeit und Verwendung von API-Dokumentationen](https://dl.gi.de/handle/20.500.12116/33515) Showcases requirements for a good security API [[HZHW20]](../../refs#hzhw20) diff --git a/content/docs/agility/frontiers.md b/content/docs/agility/frontiers.md deleted file mode 100644 index 989ce66a447aeb73f9d799fb9a21bef23d2ea8f7..0000000000000000000000000000000000000000 --- a/content/docs/agility/frontiers.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Frontiers of Cryptography" -linktitle: "Frontiers of Cryptography" -date: 2021-05-06T00:12:24+02:00 -draft: false -type: docs -weight: 5 ---- -- Blockchains difficult - - [Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency](https://ieeexplore.ieee.org/document/9043192) This research work presents basic analysis and the background understanding of Stateful Hash-based Signature Schemes, particularly the Lamport One-Time Signature Scheme, Winternitz One-Time Signature Scheme, and the Merkle Signature Scheme. [[NWAO19]](../../refs#nwao19) -- Satellites difficult - - [Quantum Resistant Authentication Algorithms for Satellite-Based Augmentation Systems](https://web.stanford.edu/group/scpnt/gpslab/pubs/papers/Neish_2018_IONITM_QuantumResistantAuthenticationUpdated.pdf) Introduces the cryptographic primitives necessary to understand the vulnerabilities in modern day cryptography due to quantum computing and investigates the use of TESLA and EC-Schnorr algorithms in broadcast systems. [[NWE19]](../../refs#nwe19) -- Cryptographic primitives handable - - [Cryptographic Agility and its Relation to Circular Encryption](https://eprint.iacr.org/2010/117) Researches whether wPRFs (weak-PRFs) are agile and whether every secure (IND-R) encryption scheme is secure when encrypting cycles. [[ABBC10]](../../refs#abbc10) diff --git a/content/docs/agility/incentives.md b/content/docs/agility/incentives.md deleted file mode 100644 index 028c6d84f47e5c738b965af4a50c781b7dd35260..0000000000000000000000000000000000000000 --- a/content/docs/agility/incentives.md +++ /dev/null @@ -1,15 +0,0 @@ ---- -title: "Incentives" -linktitle: "Incentives" -date: 2021-05-06T00:12:16+02:00 -draft: false -type: docs -weight: 4 ---- -- Ranking by best practice as incentive - - [Biggest Failures in Security](https://drops.dagstuhl.de/opus/volltexte/2020/11981/) Tries to identify the "biggest failures" in security and to get a comprehensive understanding on their overall impact on security. [[AVVY19]](../../refs#avvy19) -- Best practice for agility in protocols - - [Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms](https://tools.ietf.org/html/rfc7696) Provides guidelines to ensure that protocols have the ability to migrate from one mandatory-to-implement algorithm suite to another over time. [[Hou15]](../../refs#hou15) -- Building blocks of crypto-agility - - [On the importance of cryptographic agility for industrial automation](https://www.degruyter.com/document/doi/10.1515/auto-2019-0019/html) This work motivates cryptographic agility by discussing the threat of quantum computers to moderncryptography. [[PN19]](../../refs#pn19) - diff --git a/content/docs/agility/modalities.md b/content/docs/agility/modalities.md deleted file mode 100644 index b8b77b8dc9c19e39b1a741c25337a3512dd154b0..0000000000000000000000000000000000000000 --- a/content/docs/agility/modalities.md +++ /dev/null @@ -1,20 +0,0 @@ ---- -title: "Modalities" -linktitle: "Modalities" -date: 2021-05-06T00:11:45+02:00 -draft: false -type: docs -weight: 1 ---- -- New agile protocols: - - [Security Agility Solution Independent of the Underlaying Protocol Architecture](https://www.semanticscholar.org/paper/Security-Agility-Solution-Independent-of-the-Vasic-Mikuc/489054a1f28eb26b1baa1a9f0caff2306c821695) The agilecryptographic negotiation protocol (ACNP) proposed in this paper repre-sents a layer-agnostic, robust solution that can be deployed for providingcryptographic agility and greatly improve security. [[VM12]](../../refs#vm12) - - [Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency](https://ieeexplore.ieee.org/document/9043192) This research work presents basic analysis and the background understanding of Stateful Hash-based Signature Schemes, particularly the Lamport One-Time Signature Scheme, Winternitz One-Time Signature Scheme, and the Merkle Signature Scheme. [[NWAO19]](../../refs#nwao19) -- Enhance existing protocols for use with PQC - - [Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Algorithm Agility](https://tools.ietf.org/html/rfc8636.html) This document updates the Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) standard (RFC 4556) to remove protocol structures tied to specific cryptographic algorithms. [[AZCH19]](../../refs#azch19) - - [The Secure Socket API: TLS as an Operating System Service](https://www.usenix.org/conference/usenixsecurity18/presentation/oneill) We explore the use of the standard POSIX socket API as a vehicle for a simplified TLS API, while also giving administrators the ability to control applications and tailor TLS configuration to their needs. [[OHW+18]](../../refs#ohw18) -- Enhance existing infrastructure for PQC - - [Algorithm Agility – Discussion on TPM 2.0 ECC Functionalities](https://link.springer.com/chapter/10.1007%2F978-3-319-49100-4_6) In this paper, we review all the TPM 2.0 ECC functionalities, and discuss on whether the existing TPM commands can be used to implement new cryptographic algorithms which have not yet been addressed in the specification. [[CU16]](../../refs#cu16) - - [Fail-Safe-Konzept für Public-Key-Infrastrukturen](https://tuprints.ulb.tu-darmstadt.de/246/) In dieser Dissertation wird ein Fail-Safe-Konzept für Public-Key-Infrastrukturen vorgestellt. [[Mas02]](../../refs#mas02) - - [Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems](http://www.thinkmind.org/index.php?view=article&articleid=vehicular_2015_1_30_30028) This paper proposes a multi-domain PKI architecture for intelligent transportation systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, today. [[UWK15]](../../refs#uwk15) -- Draft for composite keys and signatures - - [Composite Keys and Signatures For Use In Internet PKI](https://tools.ietf.org/id/draft-ounsworth-pq-composite-sigs-01.html) This document defines the structures CompositePublicKey, CompositeSignatureValue, and CompositeParams, which are sequences of the respective structure for each component algorithm. [[OP20]](../../refs#op20) diff --git a/content/docs/agility/testing.md b/content/docs/agility/testing.md deleted file mode 100644 index 897ac4e0c5a75949b6253aa766061e58f72f1d9a..0000000000000000000000000000000000000000 --- a/content/docs/agility/testing.md +++ /dev/null @@ -1,10 +0,0 @@ ---- -title: "Testing" -linktitle: "Testing" -date: 2021-05-06T00:12:09+02:00 -draft: false -type: docs -weight: 3 ---- -- Algorithm relations for better test coverage - - [Systematic Testing of Post-Quantum Cryptographic Implementations Using Metamorphic Testing](https://ieeexplore.ieee.org/document/8785645) Investigates the effectiveness of a systematic testing approach for discovering bugs in highly complex cryptographic algorithm implementations. [[PRKK19]](../../refs#prkk19) diff --git a/content/docs/contributing.md b/content/docs/contributing.md deleted file mode 100644 index 9e8702b77709a461b4029883472587ee2bb137ff..0000000000000000000000000000000000000000 --- a/content/docs/contributing.md +++ /dev/null @@ -1,25 +0,0 @@ ---- -title: "How to Contribute" -linktitle: "How to Contribute" -date: 2021-05-05T22:18:28+02:00 -draft: false -type: docs -weight: 9 ---- -Your contributions are always welcome! - -To contribute to this site send a Pull Request to our repository on [Gitlab](https://code.fbi.h-da.de/cspub/cma) -#### Guidelines - -* Use the development branch. -* Add one link per Pull Request. - * Make sure the PR title is in the format of `Add project-name`. - * Write down the reason why the contribution is suitable. -* Add the link: `* [project-name](http://example.com/) - A short description ends with a period.` - * Keep descriptions concise and **short**. -* Add a section if needed. - * Add the section description. - * Add the section title to Table of Contents. -* Search previous Pull Requests or Issues before making a new one, as yours may be a duplicate. -* Check your spelling and grammar. -* Remove any trailing whitespace. diff --git a/content/docs/libraries.md b/content/docs/libraries.md deleted file mode 100644 index bff3ef365e3c29be525364428aca53d5d1c89a20..0000000000000000000000000000000000000000 --- a/content/docs/libraries.md +++ /dev/null @@ -1,24 +0,0 @@ ---- -title: "Cryptographic Libraries and Interfaces" -linktitle: "Cryptographic Libraries and Interfaces" -date: 2021-05-06T00:13:06+02:00 -draft: false -type: docs -weight: 7 -menu: - main: - weight: 4 ---- -- [NaCL (Salt)](https://nacl.cr.yp.to/): -Software library for network communication, encryption, decryption, signatures, etc. - -- [Libsodium](https://libsodium.gitbook.io/doc/): -Portable, cross-compilable, installable, packageable fork of NaCl, with a compatible API software library for encryption, decryption, signatures, password hashing etc. - -- [LibHydrogen](https://github.com/jedisct1/libhydrogen): -Lightweight crypto library for constrained environments. - -- [WASI Cryptography APIs](https://github.com/WebAssembly/wasi-crypto): -Development of cryptography API proposals for the WASI Subgroup of the [WebAssembly Community Group](https://www.w3.org/community/webassembly/) - -- [Botan: Crypto and TLS for Modern C++](https://botan.randombit.net/) A C++ cryptographic library implementing a range of practical systems, such as TLS protocol, X.509 certificates, modern AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes. Several other language bindings are available, including Python. Versions of Botan that are approved by the BSI can be found on the [Github repository](https://github.com/Rohde-Schwarz/botan) diff --git a/content/docs/migration/_index.md b/content/docs/migration/_index.md deleted file mode 100644 index 46afe95f5f9c8eb48fff977deb0a0fe8c0b5a9ec..0000000000000000000000000000000000000000 --- a/content/docs/migration/_index.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "State of Migration" -linktitle: "State of Migration" -date: 2021-05-05T22:35:41+02:00 -draft: false -type: docs -weight: 4 ---- diff --git a/content/docs/migration/algorithms.md b/content/docs/migration/algorithms.md deleted file mode 100644 index c6907e3c2bf1a5a93e26c562b9a5560d2bc7bc23..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms.md +++ /dev/null @@ -1,34 +0,0 @@ ---- -title: "PQC Algorithms" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 1 ---- -The current state of PQC is represented by the ongoing [NIST PQC standardization process](https://www.nist.gov/pqcrypto) -- [Report on post-quantum cryptography](https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf) [[CJL+16]](../../refs#cjl16). -- [Status report on the first round](https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8240.pdf) [[AASA+19]](../../refs#aasa19). -- [ Status report on the second round](https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf) [[MAA+20]](../../refs#maa20). - -#### **NIST PQC candidate algorithms:** - -| Algorithm | Description | Type | NIST Round | -|-------------------------------------|-------------|------|------------| -| [BIKE](https://bikesuite.org/) | Bit flipping key encapsulation based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check) [[ABB+20]](../../refs#abb20) | Public-key Encryption and Key-establishment | Round Three Alternative | -| [CRYSTALS-Dilithium](https://pq-crystals.org/dilithium/) | Digital signature scheme based on the hardness of lattice problems over module lattices [[DKL+21]](../../refs#dkl21) | Digital Signature | Round 3 Finalist | -| [Falcon](https://falcon-sign.info/) | Lattice-based signature scheme based on the short integer solution problem (SIS) over NTRU lattices [[FHK+20]](../../refs#fhk+20) | Digital Signature | Round 3 Finalist | -| [FrodoKEM](https://frodokem.org/)| Key encapsulation from generic lattices [[NAB+20]](../../refs#nab+20) | Public-key Encryption and Key-establishment | Round Three Alternative | -| [GeMSS](https://www-polsys.lip6.fr/Links/NIST/GeMSS.html) | Multivariate signature scheme producing small signatures [[CFP+19]](../../refs#cfp19) | Digital Signature | Round Three Alternative | -| [HQC](http://pqc-hqc.org/) | Hamming quasi-cyclic code-based public key encryption scheme [[MAB+20]](../../refs#mab20) | Public-key Encryption and Key-establishment | Round Three Alternative | -| [KYBER](https://pq-crystals.org/kyber/) | IND-CCA2-secure key-encapsulation mechanism (KEM) based on hard problems over module lattices [[ABD+21]](../../refs#abd21)| Public-key Encryption and Key-establishment | Round 3 Finalist | -| [Classic McEliece](https://classic.mceliece.org/) | Code-based public-key cryptosystem based on random binary Goppa codes [[CCU+20]](../../refs#ccu+20) | Public-key Encryption and Key-establishment | Round 3 Finalist | -| [NTRU](https://ntru.org/) | Public-key cryptosystem based on lattice-based cryptography [[CDH+19]](../../refs#cdh19) | Public-key Encryption and Key-establishment | Round 3 Finalist | -| [NTRU-Prime](https://ntruprime.cr.yp.to/) | Small lattice-based key-encapsulation mechanism (KEM) [[BBC+20]](../../refs#bbc20) | Public-key Encryption and Key-establishment | Round 3 Alternative | -| [Picnic](https://microsoft.github.io/Picnic/) | Digital signature algorithems based on the zero-knowledge proof system and symmetric key primitives [[CDG+17]](../../refs#cdg17) | Digital Signature | Round 3 Alternative | -| [Rainbow](https://www.pqcrainbow.org/)| Public key cryptosystem based on the hardness of solving a set of random multivariate quadratic systems [[DS05]](../../refs#ds05) | Digital Signature | Round 3 Finalist | -| [SABER](https://www.esat.kuleuven.be/cosic/pqcrypto/saber/) | IND-CCA2-secure Key Encapsulation Mechanism (KEM) based on the hardness of the Module Learning With Rounding problem (MLWR) [[DKR+19]](../../refs#dkr+19) | Public-key Encryption and Key-establishment | Round 3 Finalist | -| [SIKE](https://sike.org/)| Isogeny-based key encapsulation suite based on pseudo-random walks in supersingular isogeny graphs [[CCH+20]](../../refs#cch20) | Public-key Encryption and Key-establishment | Round 3 Alternative | -| [SPHINCS+](https://sphincs.org/) | A stateless hash-based signature scheme [[BHK+19]](../../refs#bhk19) | Digital Signature | Round 3 Alternative | -|| -| [NewHope](https://newhopecrypto.org/) | Key-exchange protocol based on the Ring-Learning-with-Errors (Ring-LWE) problem [[ADPS16]](../../refs#adps16) | Public-key Encryption and Key-establishment | Round Two | -| [qTESLA](https://qtesla.org/) | Signature schemes based on the hardness of the decisional Ring Learning With Errors (R-LWE) problem [[ABB+20]](../../refs#abb20) | Digital Signature | Round Two | diff --git a/content/docs/migration/automation.md b/content/docs/migration/automation.md deleted file mode 100644 index 99dfdfecb65ca29632081b43b036dad759b5098f..0000000000000000000000000000000000000000 --- a/content/docs/migration/automation.md +++ /dev/null @@ -1,11 +0,0 @@ ---- -title: "Automation and Frameworks" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 5 ---- -- RFC6916 PKIs Process Formalization: - - [Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI)](https://tools.ietf.org/html/rfc6916): RFC6916 formalizes the Migration Process for algorithm suites in the Resource Public Key Infrastructure [[GKT13]](../../refs#gkt13) -- Muckle Protocol Security Analysis: - - [Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange](https://eprint.iacr.org/2020/099.pdf): Framework for the security analysis of hybrid authenticated key exchange protocols and Introduction of the Muckle protocol [[DHP20]](../../refs#dhp20) diff --git a/content/docs/migration/performance.md b/content/docs/migration/performance.md deleted file mode 100644 index 67f57270e030e6a7056e7621039121749e1b4a83..0000000000000000000000000000000000000000 --- a/content/docs/migration/performance.md +++ /dev/null @@ -1,48 +0,0 @@ ---- -title: "Performance Considerations" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 2 ---- -Evaluation of the performance of PQC algorithms in various facets, classified into thethree subcategories: *Algorithm Performance, Network Performance, and Hardware Performance* - -##### **Algorithm Performance** -- PQC evaluation on chosen hardware: - - [On Feasibility of Post-Quantum Cryptography on Small Devices](https://www.sciencedirect.com/science/article/pii/S2405896318308474) Experimental post-quantum cryptography implementations on small devices with different platforms [[MPD+18]](../../refs#mpd18) - - [Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms](https://link.springer.com/chapter/10.1007/978-3-030-41025-4_8) Evaluation of the NIST candidates regarding their suitability for the implementation on special hardware platforms [[MRD+20]](../../refs#mrd20) -- Improvements to PQC algorithms: - - [Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors](https://ieeexplore.ieee.org/abstract/document/9238630?casa_token=j7T_SBR8ECgAAAAA:Skx0Ze-JY3YP5CSLn20TOmrWviAP_-aUZ0b9W_gpR5fDpO8AWLigR52JC4qZVPTbLlIzv-3p2g) 52% and 83% improvement in performance for the CRYSTALS-Kyber KEM SHA3 variant and AES variant through Vectorization [[KKP20]](../../refs#kkp20) - - [Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4](http://link.springer.com/10.1007/978-3-030-23696-0_11) Optimized software implementation of Kyber for the ARM Cortex-M4 microcontroller [[BKS19]](../../refs#bks19) - - [CTIDH: Faster Constant-Time CSIDH](https://eprint.iacr.org/2021/633.pdf) Speed records for constant-time CSIDH (Commutative Supersingular Isogeny Diffie–Hellman) through combining a new key space with a new algorithm [[BBC+21]](../../refs#bbc21) -- Lattice-based vs. Isogeny-based: - - [Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication](https://link.springer.com/chapter/10.1007/978-3-030-59013-0_15) Two solutions for the integration of PQ primitives into the industrial protocol Open Platform Communications Unified Architecture (OPC UA) [[PASC20]](../../refs#pasc20) - - [Incorporating Post-Quantum Cryptographyin a Microservice Environment](https://homepages.staff.os3.nl/~delaat/rp/2019-2020/p13/report.pdf) On the practical feasibility of using PQCin a microservice architecture [[WvdG20]](../../refs#wvdg20) -- PQC in IoT: - - [From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things](https://ieeexplore.ieee.org/abstract/document/8932459) A wide view of post-quantum IoT security and give useful guidelines [[FC20]](../../refs#fc20) - -##### **Hardware Performance** -- CRYSTALS-Dilithium and qTesla: - - [NIST Post-Quantum Cryptography - A Hardware Evaluation Study](https://eprint.iacr.org/2019/047) A hardware-based comparison of the NIST PQC candidates [[BSNK19]](../../refs#bsnk19) -- Performance critial use cases: - - [Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography](https://ieeexplore.ieee.org/document/9020384) Improved unconventional-radix finite-field multiplication (IFFM) algorithm reducing computational complexity by about 20% [[TLW19]](../../refs#tlw19) -- FPGA performance benefits: - - [Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co-design approaches](https://cryptography.gmu.edu/athena/PQC/GMU_PQC_2020_SW_HW.pdf) Methodology for implementing and benchmarking PQC candidates usingboth hardware and software/hardware co-design approaches [[DFA+20]](../../refs#dfa20) - - [Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves](https://ieeexplore.ieee.org/abstract/document/7725935) Isogeny-based schemes can be implemented with high efficiency on reconfigurable hardware [[KAMJ17]](../../refs#kamj17) - - [Post-Quantum Secure Boot](https://ieeexplore.ieee.org/document/9116252) Post-quantum secure boot solution implemented fully as hardware for reasons of security and performance [[KGC+20]](../../refs#kgc20) -- Hardware Security Modules (HSMs): - - [Post-Quantum Secure Architectures for Automotive Hardware Secure Modules](https://eprint.iacr.org/2020/026.pdf) Building a post-quantum secure automotive HSM is feasible and can meet the hard requirements imposed by a modern vehicle ECU [[WaSt20]](../../refs#wast20) - -##### **Network Performacne** -- Measurments and benchmarks: - - [Benchmarking Post-Quantum Cryptography in TLS](https://eprint.iacr.org/2019/1447) Packet loss rates above 3–5% start to have a significantimpact on post-quantum algorithms that fragment across many packets [[PST19]](../../refs#pst19) - - [Real-world measurements of structured-lattices and supersingular isogenies in TLS](https://www.imperialviolet.org/2019/10/30/pqsivssl.html) Computational advantages of structured lattices make them a more attractive choice for post-quantum confidentiality [[Lang19]](../../refs#lang19) - - [Measuring TLS key exchange with post-quantum KEM](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/kwiatkowski-measuring-tls.pdf) [[KSL+19]](../../refs#ksl19) - - [Post-Quantum Authentication in TLS 1.3: A Performance Study](http://eprint.iacr.org/2020/071) Detailed performance evaluation of the NIST signature algorithm candidates and imposed latency on TLS 1.3 [[SKD20]](../../refs#skd20) -- TLS, DTLS, IKEv2 and QUIC PQC integrations: - - [The TLS Post-Quantum Experiment](https://blog.cloudflare.com/the-tls-post-quantum-experiment/) Evaluating the performance and feasibility of deployment in TLS of two post-quantum key agreement ciphers [[KwVa19]](../../refs#kwva19) - - [Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyberand SPHINCS+ with Mbed TLS](https://dl.acm.org/doi/abs/10.1145/3320269.3384725) Post-quantum key establishment with Kyber performs well in TLS on embedded devices compared to ECC variants [[BSKNS20]](../../refs#bskns20) - - [The Viability of Post-quantum X.509 Certificates](https://eprint.iacr.org/2018/063) Signature schemes standardized in NIST PQ Project can work with X.509certs in a post-quantum Internet [[KPDG18]](../../refs#kpdg18) - - [Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project](https://link.springer.com/chapter/10.1007%2F978-3-319-69453-5_2) [[StMo16]](../../refs#stmo16) -- VPN evaluations: - - [Two PQ Signature Use-cases: Non-issues, challenges and potential solutions](https://eprint.iacr.org/2019/1276) Dilithium and Falcon are the best available options but come with an impact on TLS performance [[KaSi19]](../../refs#kasi19) diff --git a/content/docs/migration/process.md b/content/docs/migration/process.md deleted file mode 100644 index 070f6a3165230157766baa06cc02d4ea3d2c447e..0000000000000000000000000000000000000000 --- a/content/docs/migration/process.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -title: "Algorithm Migration Process" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 4 ---- -- Hybrid TLS & SSH Implementation: - - [Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/stebila-prototyping-post-quantum.pdf): Hybrid approach: Two or more independent algorithms chosen from both post-quantum, and classical schemes [[CPS19]](../../refs#cps19) - - [Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte](https://arxiv.org/pdf/2102.00157v1): Field report on the integration of thePQC methods McEliece and SPHINCS+ based on the eUCRITE API [[ZWH21]](../../refs#zwh21) -- Hybrid Lattice-Based: - - [ImperialViolet - CECPQ1 results](https://www.imperialviolet.org/2016/11/28/cecpq1.html): Successful experiment using hybrid approach, no network problems and a median connection latency increase of one millisecond [[A.16]](../../refs#a.16) - - [Experimenting with Post-Quantum Cryptography](https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html): Same experiment, see above [[Bra16]](../../refs#bra16) - - [Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial m2m communication](http://link.springer.com/10.1007/978-3-030-59013-0_15): Tradeoffs in security: big key/certificate sizes results in problems and difficulties for various protocols.[[PS20]](../../refs#ps20) - - [Incorporating post-quantum cryptography in a microservice environment](https://homepages.staff.os3.nl/~delaat/rp/2019-2020/p13/report.pdf): Post-Quantum algorithms perform on a similar level to classical ones. The most feasible algorithms are lattice-based. [[WvdG20]](../../refs#wvdg20) -- Hybrid PQ CECPQ2(b) & X25519: - - [The TLS Post-Quantum Experiment](https://blog.cloudflare.com/the-tls-post-quantum-experiment/): Experiment between google and cloudflare comparing three groups using post-quantum CECPQ2, CECPQ2b or non-post-quantum X25519.[[KV19]](../../refs#kv19) -- Hybrid Certificates: - - [X.509-Compliant Hybrid Certificates for the Post-Quantum Transition](http://tubiblio.ulb.tu-darmstadt.de/115809/): Parallel usage of two independent cryptographic schemes within public key infrastructures enabling a stepwise transition to post-quantum secureand hybrid algorithms [[BBG+19]](../../refs#bbg19) -- PQC protocol integration: - <!-- - [Post-Quantum Kryptographie - Classic McEliece](/docs/migration/McEliece.pdf) Introducing a new ASN.1 PQ key format and an evaluation of PQ integration for several cryptographic protocols [[Meun21]](../../refs#meun21) --> diff --git a/content/docs/migration/security.md b/content/docs/migration/security.md deleted file mode 100644 index 5bb1a7106255252b758255617563bb721503cf35..0000000000000000000000000000000000000000 --- a/content/docs/migration/security.md +++ /dev/null @@ -1,32 +0,0 @@ ---- -title: "Security Considerations" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 3 ---- -##### **Algorithm, Parameter Selection and Tradeoffs** -- Key/sig. size problematic for protocols: - - [The Viability of Post-quantum X.509 Certificates](https://eprint.iacr.org/2018/063.pdf): Present suitable parameters for software signature use cases and good signature candidates for TLS 1.3 authentication. [[KPDG18]](../../refs#kpdg18) - - [Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial m2m communication](http://link.springer.com/10.1007/978-3-030-59013-0_15): Tradeoffs in security: big key/certificate sizes results in problems and difficulties for various protocols.[[PS20]](../../refs#ps20) - -##### **Cryptanalysis** -- PQC schemes broken by cryptanalysis: - - [Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme](https://eprint.iacr.org/2019/1490.pdf): A new type of attack called Subfield Differential Attack (SDA) on Lifted Unbalanced Oil and Vinegar (LUOV) [[DDS+20]](../../refs#dds20) - - [Quantum cryptanalysis on some generalized Feistel schemes](https://eprint.iacr.org/2017/1249.pdf): Quantum distinguishers to introduce generic quantum key-recovery attacks [[DLW19]](../../refs#dlw19) - - [A reaction attack against cryptosystems based on LRPC codes.](https://eprint.iacr.org/2019/845.pdf): Analyze cryptosystems based on Low-Rank Parity-Check (LRPC) codes. [[SSPB19]](../../refs#sspb19) -- New security assessment methods: - - [Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE.](https://eprint.iacr.org/2019/103.pdf): New models of computation which allow a direct comparison between classical and quantum algorithms [[JS19]](../../refs#js19) - - [A classification of differential invariants for multivariate post-quantum cryptosystems](http://link.springer.com/10.1007/978-3-642-38616-9_11): Present an extension of a recent measure of security against a differential adversary. The technique assures security against any first-order differential invariant adversary. [[PST13]](../../refs#pst13) -- Code-based PQC algorithms for PRNG: - - [Testing of Code-Based Pseudorandom Number Generators for Post-Quantum Application](https://www.researchgate.net/publication/342456148_Testing_of_Code-Based_Pseudorandom_Number_Generators_for_Post-Quantum_Application): Code-based pseudorandom generator, improvement of Fischer-Stern generator [[KKS+20]](../../refs#kks20) - -##### **Side-Channel Attacks** -- Side-Channel Attacks: - - [Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions](https://arxiv.org/abs/2005.04344): Overview of several PQC-related side-channel attacks[[CCA+21]](../../refs#cca21) -- Minimize attack vectors: - - [Physical protection of lattice-based cryptography: Challenges and solutions](https://pure.qub.ac.uk/files/156772945/paper.pdf): Attack and countermeasure for gaussian sampler of lattice-based schemes. [[KOV+18]](../../refs#kov18) - - [A side-channel resistant implementation of saber](https://eprint.iacr.org/2020/733.pdf): State of the art in terms of side channel attacks against lattice based cryptosystems and their respective countermeasures. [[VBDK+20]](../../refs#vbdk20) - - [Side-Channel Analysis and Countermeasure Design on ARM-based Quantum-Resistant SIKE](https://ieeexplore.ieee.org/document/9181442): Side-Channel resistant implementation of saber, using masking as a countermeasure [[ZYD20]](../../refs#zyd20) -- Successfull attack on Himq-3: - - [A complete cryptanalysis of the post-quantum multivariate signature scheme himq-3](https://link.springer.com/chapter/10.1007%2F978-3-030-61078-4_24): Singularity Attack: Successfully breaks signatures of the multivarite public key scheme Himq-3 [[DDW20]](../../refs#ddw20) diff --git a/content/docs/migration/standards.md b/content/docs/migration/standards.md deleted file mode 100644 index 38dbc813357acac16ac0bbf2831bea4bbb99b314..0000000000000000000000000000000000000000 --- a/content/docs/migration/standards.md +++ /dev/null @@ -1,17 +0,0 @@ ---- -title: "New Standards" -date: 2021-05-06T00:11:20+02:00 -draft: false -type: docs -weight: 6 ---- -- NIST Report on Round 3 Finalists: - - [Status report on the second round of the NIST post-quantum cryptography standardization process](https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf): Third round finalists for public-key encryption / key-establishment algorithms and digital signatures [[MAA+20]](../../refs#maa20) -- Review of NIST Candidates: - - [Standardisierung von post-quanten-kryptografie und empfehlungen des bsi](https://www.bsi.bund.de/DE/Service-Navi/Veranstaltungen/Deutscher-IT-Sicherheitskongress-30-Jahre-BSI/deutscher-it-sicherheitskongress-30-jahre-bsi_node.html): Overview of the current state of standardization of post Quantum cryptography with respect to the BSI recommendations. [[HKW21]](../../refs#hkw21) -- Open Quantum Project: - - [Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project](https://eprint.iacr.org/2016/1017.pdf): Open Quantum Project, libqos library: exemplary cryptographic applications like OpenSSL. Comparing NIST Round 2 PQC candidate implementations using OpenSSL [[SM16]](../../refs#sm16) -- DNSSEC PQC Draft: - - [Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC](https://dl.acm.org/doi/10.1145/3431832.3431838): Evaluate three PQC-Algorithms that are suitable for DNSSEC within certain constraints [[MdJvH+20]](../../refs#mdjvh20) -- Decentralized Cert. Management: - - [Next-generation web public-key infrastructure technologies](https://eprints.qut.edu.au/128643): New decentralized approach to certificate management based on generic blockchains (DPKIT), compatible with existing PKIs. [[HM19]](../../refs#hm19) diff --git a/content/docs/projects.md b/content/docs/projects.md deleted file mode 100644 index dfc094d5679158835c0aaa03a9d8e4da90839536..0000000000000000000000000000000000000000 --- a/content/docs/projects.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -title: "Projects and Initiatives" -linktitle: "Projects and Initiatives" -date: 2021-05-06T00:12:55+02:00 -draft: false -type: docs -weight: 6 -menu: - main: - weight: 2 ---- -- [Open Quantum Safe](https://openquantumsafe.org/): -An open-source project that aims to support the development and prototyping of quantum-resistant cryptography. - -- [Quantum RISC](https://www.quantumrisc.de/): -Next Generation Cryptography for Embedded Systems. - -- [Eclipse CogniCrypt]( https://www.eclipse.org/cognicrypt/): -Secure Integration of Cryptographic Software. - -- [BSI-Project: Secure Implementation of a Universal Crypto Library](https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/Kryptografie/Kryptobibliothek-Botan/kryptobibliothek-botan_node.html) More information (in German language) can be found in the [project summary](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Krypto/Projektzusammenfassung_Botan.pdf) diff --git a/content/docs/refs.md b/content/docs/refs.md deleted file mode 100644 index daa621dd76bdccd30cf7067e07a05b25b29a4945..0000000000000000000000000000000000000000 --- a/content/docs/refs.md +++ /dev/null @@ -1,301 +0,0 @@ ---- -title: "References" -linktitle: "References" -date: 2021-05-06T00:13:12+02:00 -draft: false -type: docs -weight: 8 ---- -###### [A.16] -[A. Langley. ImperialViolet - CECPQ1 results, 2016.](https://www.imperialviolet.org/2016/11/28/cecpq1.html) - -###### [AASA+19] -[G. Alagic, J. Alperin-Sheriff, D. Apon, D. Cooper, Q. Dang, Y. Liu, C. Miller, D.Moody, R. Peralta, et al.2019.Status report on the first round of the NIST post-quantum cryptography standardization process. US Department of Commerce,National Institute of Standards and Technology](https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8240.pdf) - -###### [ABB+20] -[E. Alkim, P. S. L. M. Barreto, N. Bindel, J. Krämer, P. Longa, and J. E. Ricardini. The lattice-based digital signature scheme qtesla. In M. Conti, J. Zhou, E. Casalicchio, and A. Spognardi, editors, Applied Cryptography and Network Security, pages 441–460. Springer International Publishing, 2020](https://eprint.iacr.org/2019/085.pdf) - -###### [ABB+20] -[N. Aragon, P. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, S. Gueron, T. Guneysu, C. A. Melchor, et al.2020. BIKE: bit flipping key encapsulation (22 Oct 2020)](https://bikesuite.org/files/v4.1/BIKE_Spec.2020.10.22.1.pdf) - -###### [ABBC10] -[T. Acar, M. Belenkiy, M. Bellare, and D. Cash. Cryptographic agility and its relation to circular encryption. 2010.](https://eprint.iacr.org/2010/117) - -###### [ABD+21] -[R. Avanzi, J. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J. M. Schanck,P. Schwabe, G. Seiler, and D. Stehlé. 2021. CRYSTALS-Kyber algorithm specifi-cations and supporting documentation (version 3.01).NIST PQC Round 3(31Jan 2021)](https://pq-crystals.org/kyber/data/kyber-specification-round3-20210131.pdf) - -###### [ABF+17] -[Y. Acar, M. Backes, S. Fahl, S. Garfinkel, D. Kim, M. L. Mazurek, and C. Stransky. Comparing the Usability of Cryptographic APIs. In 2017 IEEE Symposium on Security and Privacy (SP), pages 154–171, San Jose, CA, USA, May 2017. IEEE, doi:10.1109/SP.2017.52](http://ieeexplore.ieee.org/document/7958576/) - -###### [ADPS16] -[E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe. Post-quantum key exchange—a new hope. In 25Th {USENIX } security symposium ( {USENIX } security 16), pages 327–343, 2016](https://eprint.iacr.org/2015/1092.pdf) - -###### [AVVY19] -[F. Armknecht, I. Verbauwhede, M. Volkamer, and M. Yung, editors. Biggest Failures in Security, volume 9 of Dagstuhl Reports. Dagstuhl Publishing, Nov. 2019.](https://drops.dagstuhl.de/opus/volltexte/2020/11981/) - -###### [AZCH19] -[L. Hornquist Astrand, L. Zhu, M. Cullen, and G. Hudson. Public key cryptography for initial authentication in kerberos (PKINIT) algorithm agility. 2019. RFC 8636.](https://tools.ietf.org/html/rfc8636.html) - -###### [BBC+20] -[D. Bernstein, B. Brumley, M. Chen, C. Chuengsatiansup, T. Lange, A. Marotzke, N. Tuveri, C. van Vredendaal, and B. Yang. Ntru prime: round 3 20201007. 2020](https://ntruprime.cr.yp.to/nist/ntruprime-20201007.pdf) - -###### [BBC+21] -[G. Banegas, D. J. Bernstein, F. Campos, T. Chou, T. Lange, M. Meyer, B. Smith and J. Sotáková. CTIDH: faster constant-time CSIDH. 2021. Cryptology ePrint Archive, Report 2021/633](https://eprint.iacr.org/2021/633) - -###### [BBG+19] -[Bindel, N., Braun, J., Gladiator, L., Stöckert, T., & Wirth, J. (2019). X. 509-compliant hybrid certificates for the post-quantum transition. Journal of Open Source Software, 4(40), 1606](https://joss.theoj.org/papers/10.21105/joss.01606) - -###### [BHK+19] -[D. J. Bernstein, A. Hülsing, S. Kölbl, R. Niederhagen, J. Rijneveld, and P. Schwabe. The sphincs+ signature framework. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS ’19, page 2129–2146, New York, NY, USA, 2019. Association for Computing Machinery. doi:10.1145/3319535.3363229](https://eprint.iacr.org/2019/1086.pdf) - -###### [BKS19] -[L. Botros, M. J. Kannwischer, and P. Schwabe. Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4. In J. Buchmann and T. Nitaj, A.and Rachidi, editors, Progress in Cryptology – AFRICACRYPT 2019, volume 11627, pages 209–228. Springer International Publishing, Cham, 2019. Series Title: Lecture Notes in Computer Science. doi:10.1007/978-3-030-23696-0_11](http://link.springer.com/10.1007/978-3-030-23696-0_11) - -###### [BPS21] -[Barker, W., Polk, W., & Souppaya, M. (2021). Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms (pp. 10-10). National Institute of Standards and Technology](https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf) - -###### [Bra16] -[M. Braithwaite. Experimenting with post-quantum cryptography, 2016.](https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html) - -###### [BSI20] -[BSI. 2020. Migration zu Post-Quanten-Kryptografie.](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Krypto/Post-Quanten-Kryptografie.html) - -###### [BSKNS20] -[K. Bürstinghaus-Steinbach, C. Krauß, R. Niederhagen, and M. Schneider. 2020.Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyberand SPHINCS+ with Mbed TLS. InProceedings of the 15th ACM Asia Conferenceon Computer and Communications Security (ASIA CCS ’20). Association forComputing Machinery, 841–852](https://dl.acm.org/doi/abs/10.1145/3320269.3384725) - -###### [BSNK19] -[K. Basu, D. Soni, M. Nabeel, and R. Karri. 2019. NIST Post-Quantum Cryptography - A Hardware Evaluation Study](https://eprint.iacr.org/2019/047) - -###### [CCA+21] -[S. Chowdhury, A. Covic, R. Y. Acharya, S. Dupee, and D. Ganji, F.and Forte. Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physi- cally unclonable functions. Journal of Cryptographic Engineering, February 2021.](https://arxiv.org/abs/2005.04344) - -###### [CCD+15] -[M. Campagna, L. Chen, O. Dagdelen, J. Ding, J Fernick, N. Gisin, D. Hayford, T. Jennewein, N. Lütkenhaus, and M. Mosca. 2015.Quantum SafeCryptography and Security: An introduction, benefits, enablers and chal-lenges.European Telecommunications Standards InstituteETSI White Paper,8 (June 2015), 1–64.](https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf) - -###### [CCH+20] -[M. Campagna, C. Costello, B. Hess, A. Jalali, B. Koziel, B. LaMacchia, P. Longa, M. Naehrig, J. Renes, D. Urbanik, et al. Supersingular isogeny key encapsulation. 2020](https://sike.org/files/SIDH-spec.pdf) - -###### [CCU+20] -[T. Chou, C. Cid, S. UiB, J. Gilcher, T. Lange, V. Maram, R. Misoczki, R. Niederhagen, K. G Paterson, Edoardo P., et al. Classic mceliece: conservative code-based cryptography 10 october 2020. 2020](https://classic.mceliece.org/nist/mceliece-20201010.pdf) - -###### [CDG+17] -[Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., ... & Zaverucha, G. (2017, October). Post-quantum zero-knowledge and signatures from symmetric-key primitives. In Proceedings of the 2017 acm sigsac conference on computer and communications security (pp. 1825-1842)](https://eprint.iacr.org/2017/279.pdf) - -###### [CDH+19] -[C. Chen, O. Danba, J. Hoffstein, A. Hülsing, J. Rijneveld, J. M Schanck, P. Schwabe, W. Whyte, and Z. Zhang. Ntru algorithm specifications and supporting documentation. Round-3 submission to the NIST PQC project, March 2019](https://ntru.org/f/ntru-20190330.pdf) - -###### [CFP+19] -[Casanova, J. C. Faugere, G. M. R. J. Patarin, L. Perret, and J. Ryckeghem.2019. GeMSS: a great multivariate short signature.Submission to NIST PQCcompetition Round-2(2019)](https://www-polsys.lip6.fr/Links/NIST/GeMSS_specification.pdf) - -###### [CJL+16] -[L. Chen, S. Jordan, Y. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone.2016.Report on post-quantum cryptography. Vol. 12. US Department of Com-merce, National Institute of Standards and Technology](https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf) - -###### [CPS19] -[E. Crockett, C. Paquin, and D. Stebila. Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. 2019.](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/stebila-prototyping-post-quantum.pdf) - -###### [CU16] -[L. Chen and R. Urian. Algorithm agility – discussion on TPM 2.0 ECC functionalities. In L. Chen, D. McGrew, and C. Mitchell, editors, Security Standardisation Research, volume 10074, pages 141–159. Springer Inter-national Publishing, 2016](http://link.springer.com/10.1007/978-3-319-49100-4_6.) - -###### [DDS+20] -[J. Ding, J. Deaton, K. Schmidt, Vishakha, and Z. Zhang. Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme. In D. Micciancio and T. Ristenpart, editors, Advances in Cryptology – CRYPTO 2020, pages 279–298, Cham, 2020. Springer International Publishing.](https://eprint.iacr.org/2019/1490.pdf) - -###### [DDW20] -[Z. Ding, J.and Zhang, J. Deaton, and L. Wang. A complete crypt- analysis of the post-quantum multivariate signature scheme himq- 3. In International Conference on Information and Communica- tions Security, pages 422–440. Springer, 2020.](https://link.springer.com/chapter/10.1007%2F978-3-030-61078-4_24) - -###### [DFA+20] -[V. Ba Dang, F. Farahmand, M. Andrzejczak, K. Mohajerani, D. T. Nguyen, andK. Gaj. 2020. Implementation and benchmarking of round 2 candidates in the nist post-quantum cryptography standardization process using hardware andsoftware/hardware co-design approaches.Cryptology ePrint Archive: Report2020/795(2020)](https://cryptography.gmu.edu/athena/PQC/GMU_PQC_2020_SW_HW.pdf) - -###### [DHP20] -[B. Dowling, T. Brandt Hansen, and K. G. Paterson. Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. In PQCrypto 2020, 2020.](https://eprint.iacr.org/2020/099.pdf) - -###### [DKL+21] -[L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D.Stehlé. 2021. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation.Round-3 submission to the NIST PQC project(8 Feb 2021)](https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf) - -###### [DKR+19] -[J. D’Anvers, A. Karmakar, S. Roy, F. Vercauteren, J. Mera, A. Bass, and M. Beirendonck. Saber: Mod-lwr based kem: Round 3 submission. In NIST Post-Quantum Cryptography Standardization: Round 3, 2019](https://www.esat.kuleuven.be/cosic/pqcrypto/saber/files/saberspecround3.pdf) - -###### [DLW19] -[X. Dong, Z. Li, and X. Wang. Quantum cryptanalysis on some generalized Feistel schemes. Science China Information Sciences, 62(2):22501, February 2019.](https://eprint.iacr.org/2017/1249.pdf) - -###### [DS05] -[J. Ding and D. Schmidt. Rainbow, a new multivariable polynomial signature scheme. In International Conference on Applied Cryptography and Network Security, pages 164–175. Springer, 2005](https://link.springer.com/chapter/10.1007/11496137_12) - -###### [FC20] -[Tiago M. Fernández-C. 2020. From Pre-Quantum to Post-Quantum IoT Security:A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.IEEEInternet of Things Journal7, 7 (2020), 6457–6480](https://ieeexplore.ieee.org/document/8932459) - -###### [FHK+20] -[P. A. Fouque, J. Hoffstein, P. Kirchner, V. Lyubashevsky, T. Pornin, T. Prest, T.Ricosset, G. Seiler, W. Whyte, and Z. Zhang. 2020. Falcon: Fast-fourier lattice-based compact signatures over NTRU specifications v1. 2.NIST Post-Quantum Cryptography Standardization Round3 (2020)](https://falcon-sign.info/falcon.pdf) - -###### [GKT13] -[R. Gagliano, S. Kent, and S. Turner. Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI). Request for Comments. 2013. RFC 6916.](https://tools.ietf.org/html/rfc6916) - -###### [GoKa15] -[Ghosh, S., & Kate, A. (2015, June). Post-quantum forward-secure onion routing. In International Conference on Applied Cryptography and Network Security (pp. 263-286). Springer, Cham](https://ieeexplore.ieee.org/abstract/document/9363165) - -###### [HKW21] -[H . Hagemeier, S. Kousidis, and T. Wunderer. Standardisierung von post-quanten-kryptografie und empfehlungen des bsi. In German Federal Office for Information Security (BSI), editor, Tagungsband zum 17. Deutschen IT-Sicherheitskongress, page 382–294. SecuMedia Verlag, Ingelheim, Germany, Feb 2021. Note: No direct link available!] - -###### [HLL+21] -[T. Hemmert, M. Lochter, D. Loebenberger, M. Margraf, S. Reinhardt, and G.Sigl. 2021. Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen. InTagungsband zum 17. Deutschen IT-Sicherheitskongress, German Federal Office for Information Security (BSI) (Ed.). SecuMedia Verlag,Ingelheim, Germany, 367–380](https://www.secumedia-shop.net/Deutschland-Digital-Sicher-30-Jahre-BSI) - -###### [HM19] -[S. Udyani H. Mudiyanselage. Next-generation web public-key infrastructure technologies, 2019. doi:10.5204/thesis.eprints.128643.](https://eprints.qut.edu.au/128643) - -###### [Hou15] -[R. Housley. Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms. RFC 7696, 2015.](https://tools.ietf.org/html/rfc7696) - -###### [HPDM20] -[A. Holcomb, G. C. C. F. Pereira, B. Das, and M. Mosca. PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks. arXiv:2010.06571](https://arxiv.org/abs/2010.06571) - -###### [HZHW20] -[R. Huesmann, A. Zeier, A. Heinemann, and A. Wiesmaier. Zur Benutzbarkeit und Verwendung von API-Dokumentationen. In Christian Hansen, Andreas Nürnberger, and Bernhard Preim, editors, Mensch und Computer 2020 - Workshopband, Bonn, 2020. Gesellschaft für Informatik e.V. doi:10.18420/muc2020-ws119-002.](https://dl.gi.de/handle/20.500.12116/33515) - -###### [JS19] -[S. Jaques and J. M. Schanck. Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE. In A. Boldyreva and D. Micciancio, editors, Advances in Cryptology – CRYPTO 2019, volume 11692, pages 32–61. Springer International Publish- ing, 2019.](https://eprint.iacr.org/2019/103.pdf) - -###### [KAMJ17] -[B. Koziel, R. Azarderakhsh, M. Mozaffari Kermani, and D. Jao. 2017. Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves.IEEETransactions on Circuits and Systems I: Regular Papers64, 1 (Jan. 2017), 86–99](https://ieeexplore.ieee.org/abstract/document/7725935) - -###### [KaSi19] -[P. Kampanakis and D. Sikeridis. 2019.Two PQ Signature Use-cases: Non-issues, challenges and potential solutions. Technical Report 1276](https://eprint.iacr.org/2019/1276) - -###### [KGC+20] -[V. B. Y. Kumar, N. Gupta, A. Chattopadhyay, M. Kasper, C. Krauß, and R. Nieder-hagen. 2020. Post-Quantum Secure Boot. In2020 Design, Automation Test inEurope Conference Exhibition (DATE). 1582–1585 doi:10.23919/DATE48585.2020.9116252](https://ieeexplore.ieee.org/document/9116252) - -###### [KKP20] -[S. Koteshwara, M. Kumar, and P. Pattnaik. 2020. Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors.In2020 IEEE International Symposium on Performance Analysis of Systems andSoftware (ISPASS). 223–225](https://ieeexplore.ieee.org/abstract/document/9238630) - -###### [KKS+20] -[A. Kuznetsov, A. Kiian, O. Smirnov, A. Cherep, M. Kanabekova, and I. Chepurko. Testing of Code-Based Pseudorandom Num- ber Generators for Post-Quantum Application. In 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), pages 172–177, 2020.](https://www.researchgate.net/publication/342456148_Testing_of_Code-Based_Pseudorandom_Number_Generators_for_Post-Quantum_Application) - -###### [KOV+18] -[A. Khalid, T. Oder, F. Valencia, M. O’ Neill, T. Güneysu, and F. Regazzoni. Physical protection of lattice-based cryptography: Challenges and solutions. In Proceedings of the 2018 on Great Lakes Symposium on VLSI, pages 365–370. ACM, 2018.](https://pure.qub.ac.uk/files/156772945/paper.pdf) - -###### [KPDG18] -[P. Kampanakis, P. Panburana, E. Daw, and D. Van Geest. 2018. The Viability of Post-quantum X.509 Certificates.IACR Cryptol. ePrint Arch.2018 (2018)](http://eprint.iacr.org/2018/063) - -###### [KSL+19] -[K. Kwiatkowski, N. Sullivan, A. Langley, D. Levin, and A. Mislove. 2019. Measuring TLS key exchange with post-quantum KEM. InWorkshop Record of the SecondPQC Standardization Conference](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/kwiatkowski-measuring-tls.pdf) - -###### [KV19] -[K. Kwiatkowski and L. Valenta. The TLS Post-Quantum Experiment, October 2019.](https://blog.cloudflare.com/the-tls-post-quantum-experiment/) - -###### [KwVa19] -[K. Kwiatkowski and L. Valenta. 2019. The TLS Post-Quantum Experiment](https://blog.cloudflare.com/the-tls-post-quantum-experiment/) - -###### [Lang19] -[A. Langley. 2019. Real-world measurements of structured-lattices and supersin-gular isogenies in TLS](https://www.imperialviolet.org/2019/10/30/pqsivssl.html) - -###### [LLP+13] -[K. Lee, Y. Lee, J. Park, K. Yim and I. You, "Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)," 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013, pp. 709-713, doi: 10.1109/IMIS.2013.128](https://ieeexplore.ieee.org/document/6603762) - -###### [MAA+20] -[D. Moody, G. Alagic, D. C Apon, D. A. Cooper, Q. H. Dang, J. M. Kelsey, Y.Liu, C. A. Miller, R. C. Peralta, R. A. Perlner, A. Y. Robinson, D. C. Smith-Tone,and J. Alperin-Sheriff. 2020. Status report on the second round of the NISTpost-quantum cryptography standardization process.](https://doi.org/10.6028/NIST.IR.8309) - -###### [MAB+20] -[C. Aguilar Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, E. Persichetti, G. Zémor, and I. C. Bourges. Hamming quasi-cyclic (hqc). NIST PQC Round, 3, 2020](https://pqc-hqc.org/doc/hqc-specification_2020-10-01.pdf) - -###### [Mas02] -[S. Maseberg. Fail-Safe-Konzept für Public-Key-Infrastrukturen. PhDthesis, 2002.](http://tuprints.ulb.tu-darmstadt.de/246/) - -###### [MdJvH+20] -[M. Müller, J. de Jong, M. van Heesch, B. Overeinder, and R. van Rijswijk-Deij. Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC. 50(4):49–57, 2020. doi:10.1145/3431832.3431838.](https://dl.acm.org/doi/10.1145/3431832.3431838) - -<!-- ###### [Meun21] -[Robin Meunier. Post-Quantum Kryptographie - Classic McEliece. 2021 Master Thesis. Darrmstadt University of Applied Sciences. Faculty of Computer Science.](/docs/migration/McEliece.pdf) --> - -###### [MPD+18] -[L. Malina, L. Popelova, P. Dzurenda, J. Hajny, and Z. Martinasek. 2018. On Feasibility of Post-Quantum Cryptography on Small Devices (15th IFAC Conference on Programmable Devices and Embedded Systems PDeS 2018), Vol. 51. 462–467](https://www.sciencedirect.com/science/article/pii/S2405896318308474) - -###### [MRD+20] -[L. Malina, S. Ricci, P. Dzurenda, D. Smekal, J. Hajny, and T. Gerlich. 2020. Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms. In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 109–124](https://link.springer.com/chapter/10.1007/978-3-030-41025-4_8) - -###### [MW18] -[K. Mindermann and S. Wagner. Usability and Security Effects of Code Examples on Crypto APIs. In 2018 16th Annual Conference on Privacy, Security and Trust (PST), pages 1–2. IEEE, August 2018.](https://ieeexplore.ieee.org/document/8514203) - -###### [MW20] -[K. Mindermann and S. Wagner. 2020. Fluid Intelligence Doesn’t Matter! Effectsof Code Examples on the Usability of Crypto APIs. In2020 IEEE/ACM 42ndInternational Conference on Software Engineering: Companion Proceedings (ICSE-Companion). 306–307.](https://arxiv.org/abs/2004.03973) - -###### [NAB+20] -[M. Naehrig, E. Alkim, J. W Bos, L. Ducas, K. Easterbrook, B. LaMacchia, P. Longa,I. Mironov, V. Nikolaenko, C. Peikert, et al.2020. Frodokem learning with errorskey encapsulation.NIST PQC Round3 (2020)](https://frodokem.org/files/FrodoKEM-specification-20171130.pdf) - -###### [NIWA17] -[Niederhagen, R., & Waidner, M. (2017). Practical Post-Quantum Cryptography. Fraunhofer White Paper, vol. ISSN, 2192-8169](https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Practical.PostQuantum.Cryptography_WP_FraunhoferSIT.pdf?_=1503992279) - -###### [NWAO19] -[M. D. Noel, O. V. Waziri, M. S. Abdulhamid, and A. J. Ojeniyi. Stateful hash-based digital signature schemes for bitcoin cryptocurrency. In 2019 15th International Conference on Electronics, Computer and Computation (ICECCO), pages 1–6, 2019.](https://ieeexplore.ieee.org/document/9043192/) - -###### [NWE19] -[A. Neish, T. Walter, and P. Enge. Quantum-resistant authentication algorithms for satellite-based augmentation systems. Navigation, 66(1):199–209, 2019.](https://web.stanford.edu/group/scpnt/gpslab/pubs/papers/Neish_2018_IONITM_QuantumResistantAuthenticationUpdated.pdf) - -###### [OHW+18] -[M. O’Neill, S. Heidbrink, J. Whitehead, T. Perdue, L. Dickinson, T. Collett, N. Bonner, K. Seamons, and D. Zappala. The Secure Socket API: TLS as an Operating System Service. In 27th USENIX Security Symposium (USENIX Security 18), pages 799–816. USENIX Association, 2018.](https://www.usenix.org/conference/usenixsecurity18/presentation/oneill) - -###### [OP20] -[M. Ounsworth and M. Pala. Composite Keys and Signatures For Use In Internet PKI. Internet-Draft-ounsworth-pq-composite-sigs-03, Internet Engineering Task Force, July 2020. Backup Publisher: Internet Engineering Task Force Num Pages: 18](https://tools.ietf.org/id/draft-ounsworth-pq-composite-sigs-01.html) - -###### [OPP19] -[D. Ott, C. Peikert, and participants. 2019. Identifying Research Challengesin Post Quantum Cryptography Migration and Cryptographic Agility. (Sept.2019).](https://cra.org/crn/2019/10/research-challenges-in-post-quantum-cryptography-migration-and-cryptographic-agility/) - -###### [PASC20] -[S. Paul and P. Scheible. 2020. Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication. InComputerSecurity – ESORICS 2020. Vol. 12309. Springer International Publishing, 295–316](https://link.springer.com/chapter/10.1007/978-3-030-59013-0_15) - -###### [PN19] -[S. Paul and M. Niethammer. On the importance of cryptographic agility for industrial automation. at - Automatisierungstechnik, 67(5):402–416, May 2019, doi:10.1515/auto-2019-0019](http://www.degruyter.com/view/j/auto.2019.67.issue-5/auto-2019-0019/auto-2019-0019.xml) - -###### [PRKK19] -[S. Pugh, M. S. Raunak, D. R. Kuhn, and R. Kacker. Systematic Testing of Post-Quantum Cryptographic Implementations Using Metamorphic Testing. In 2019 IEEE/ACM 4th International Workshop on Metamorphic Testing (MET), pages 2–8, Montreal, QC, Canada, May 2019. IEEE, doi:10.1109/MET.2019.00009.](https://ieeexplore.ieee.org/document/8785645/) - -###### [PS20] -[S. Paul and P. Scheible. Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial m2m communica tion. In L. Chen, N. Li, K. Liang, and S. Schneider, editors, Computer Security – ESORICS 2020, volume 12309, pages 295–316. Springer In ternational Publishing, 2020. Series Title: Lecture Notes in Computer Science. doi:10.1007/978-3-030-59013-0\_15.](http://link.springer.com/10.1007/978-3-030-59013-0_15) - -###### [PST13] -[R. Perlner and D. Smith-Tone. A classification of differential invariants for multivariate post-quantum cryptosystems. In P. Gaborit, editor, Post- Quantum Cryptography, volume 7932, pages 165–173. Springer Berlin Heidelberg, 2013. Series Title: Lecture Notes in Computer Science. doi:10.1007/ 978-3-642-38616-9_11](http://link.springer.com/10.1007/978-3-642-38616-9_11) - -###### [PST19] -[C. Paquin, D. Stebila, and G. Tamvada. 2019.Benchmarking Post-QuantumCryptography in TLS. Technical Report 1447] (http://eprint.iacr.org/2019/1447) - -###### [SKD20] -[D. Sikeridis, P. Kampanakis, and M. Devetsikiotis. 2020. Post-Quantum Authentication in TLS 1.3: A Performance Study. Technical Report 071](http://eprint.iacr.org/2020/071) - -###### [SM16] -[D. Stebila and M. Mosca. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. In R. Avanzi and H. Heys, editors, Selected Areas in Cryptography – SAC 2016, Lecture Notes in Computer Science, pages 14–37, Cham, 2016. Springer International Publishing. doi:10.1007/978-3-319-69453-5\_2.](https://eprint.iacr.org/2016/1017.pdf) - -###### [SSPB19] -[S. Samardjiska, P. Santini, E. Persichetti, and G. Banegas. A reaction attack against cryptosystems based on LRPC codes. In P. Schwabe and N. Thériault, editors, Progress in Cryptology – LATINCRYPT 2019, pages 197–216. Springer International Pub- lishing, 2019.](https://eprint.iacr.org/2019/845.pdf) - -###### [StMo16] -[D. Stebila and M. Mosca. 2016. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. In Selected Areas in Cryptography – SAC2016, R. Avanzi and H. Heys (Eds.). Springer International Publishing, 14–37](https://doi.org/10.1007/978-3-319-69453-5_2) - -###### [TLW19] -[J. Tian, J. Lin, and Z. Wang. 2019. Ultra-Fast Modular Multiplication Implementa-tion for Isogeny-Based Post-Quantum Cryptography. In2019 IEEE InternationalWorkshop on Signal Processing Systems (SiPS). 97–102 doi:10.1109/SiPS47522.2019.9020384](https://ieeexplore.ieee.org/document/9020384) - -###### [TRH+20] -[Tujner, Z., Rooijakkers, T., van Heesch, M., & Önen, M. (2020). QSOR: Quantum-Safe Onion Routing. arXiv preprint arXiv:2001.03418](https://arxiv.org/abs/2001.03418) - -###### [UWK15] -[M. Ullmann, C. Wieschebrink, and D. Kügler. Public key infrastructure and crypto agility concept for intelligent transportation systems. In Sulc, Noll (Eds.): VEHICULAR 2015: The Fourth International Conference on Advances in Vehicular Systems, Technologies and Applications. October 11-16, 2015, St. Julians, Malta, pages 14 – 19, 2015.](http://www.thinkmind.org/index.php?view=article&articleid=vehicular_2015_1_30_30028.) - -###### [VBDK+20] -[M. Van Beirendonck, J. P. D’Anvers, A. Karmakar, J. Balasch, and I. Verbauwhede. A side-channel resistant implementation of saber. IACR Cryptol. ePrint Arch, 733, 2020.](https://eprint.iacr.org/2020/733.pdf) - -###### [VM12] -[V. Vasić and M. Mikuc. Security Agility Solution Independent of the Underlaying Protocol Architecture. In AT, 918 of CEUR Workshop Proceedings, pages 128–137. CEUR-WS.org, 2012.](https://www.semanticscholar.org/paper/Security-Agility-Solution-Independent-of-the-Vasic-Mikuc/489054a1f28eb26b1baa1a9f0caff2306c821695.) - -###### [WaSt20] -[Wang, W., & Stöttinger, M. (2020). Post-Quantum Secure Architectures for Automotive Hardware Secure Modules. IACR Cryptol. ePrint Arch., 2020, 26](https://eprint.iacr.org/2020/026.pdf) - -###### [WvdG20] -[D. Weller and R. van der Gaag. 2020. Incorporating post-quantum cryptographyin a microservice environment. (2020), 36](https://homepages.staff.os3.nl/~delaat/rp/2019-2020/p13/report.pdf) - -###### [Zei20] -[A. Zeier. 08.12.2020. eucrite 1.0 API.](https://use-a-pqclib.h-da.io/eucrite-documentation/) - -###### [ZWH19] -[A. Zeier, A. Wiesmaier, and A. Heinemann. API Usability of Stateful Signature Schemes. In The 14th International Workshop on Security (IWSEC), LNCS 11689, pages 1–20. Springer Switzerland, August 2019](https://link.springer.com/chapter/10.1007/978-3-030-26834-3_13) - -###### [ZWH21] -[A. Zeier, A. Wiesmaier, and A. Heinemann. Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte. In German Federal Office for Information Security (BSI), editor, Tagungsband zum 17. Deutschen IT-Sicherheitskongress, pages 381 – 391. SecuMedia Verlag, Ingelheim, Germany, March 2021.](https://arxiv.org/pdf/2102.00157v1) - -###### [ZYD+20] -[F. Zhang, B. Yang, X. Dong, S. Guilley, Z. Liu, W. He, F. Zhang, and K. Ren. Side-Channel Analysis and Countermeasure Design on ARM- based Quantum-Resistant SIKE. IEEE Transactions on Computers, pages 1–1, 2020. Conference Name: IEEE Transactions on Computers. doi: 10.1109/TC.2020.3020407.](https://ieeexplore.ieee.org/document/9181442) diff --git a/content/docs/related.md b/content/docs/related.md deleted file mode 100644 index 73f8165296786ce83fbe41cee0cb39280e9ca3dc..0000000000000000000000000000000000000000 --- a/content/docs/related.md +++ /dev/null @@ -1,21 +0,0 @@ ---- -title: "Related Work" -linktitle: "Related Work" -date: 2021-05-05T22:18:28+02:00 -draft: false -type: docs -weight: 3 ---- -A collection of survey papers and references dealing with general challenges and recommendations regarding the migration to post-quantum cryptography and cryptographic agility. - -*A full reference list can be found in the [references](../refs) section. All references are listed in alphabetical order.* - -- [Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility](http://arxiv.org/abs/1909.07353): A wide range of topics and challenges at a high abstraction level grouped into categories of PQC migration and crypto-agility [[OPp19]](../refs#opp19) -- [Getting Ready for Post-Quantum Cryptography](https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf): Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms [[BPS21]](../refs#bps21). -- [Practical Post-Quantum Cryptography](https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Practical.PostQuantum.Cryptography_WP_FraunhoferSIT.pdf?_=1503992279): White paper from the Fraunhofer Institute for Secure Information Technology SIT addressing challenges of PQC migration and comparison of PQC algorithms [[NIWA17]](../refs#niwa17). -- [From Pre-Quantum to Post-Quantum IoT Security](https://ieeexplore.ieee.org/document/8932459): Challenges for PQC in IoT and comparison of the performance of PQC algorithms [[FC20]](../refs#fc20). -- [Biggest Failures in IT Security](https://drops.dagstuhl.de/opus/volltexte/2020/11981/pdf/dagrep_v009_i011_p001_19451.pdf): A variety of problems in achieving IT security and possible strategies to solve them [[AVVY19]](../refs#avvy19). -- [Getting Ready for Post-Quantum Cryptography](https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.05262020-draft.pdf): Challenges associated with adoption and use of post-quantum cryptographic algorithms [[BPS20]](../refs#bps20). -- [Migration zu Post-Quanten-Kryptografie](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Krypto/Post-Quanten-Kryptografie.html): Recommendations for action on migration to PQC by the BSI (German Federal Office for Information Security) [[BSI20]](../refs#bsi20). -- [Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen](https://www.secumedia-shop.net/Deutschland-Digital-Sicher-30-Jahre-BSI): A brief evaluation of the current state of both post-quantum and quantum cryptography [[HLL+21]](../refs#hll21). -- [Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges](https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf): Important use cases for cryptography and potential migration strategies to transition to post-quantum cryptography [[CCD+15]](../refs#ccd15). diff --git a/layouts/partials/footer.html b/layouts/partials/footer.html deleted file mode 100644 index 66ae792fcde28b331e74e91606ce14bfd37fa395..0000000000000000000000000000000000000000 --- a/layouts/partials/footer.html +++ /dev/null @@ -1,43 +0,0 @@ -{{ $links := .Site.Params.links }} -<footer class="bg-dark py-5 row d-print-none"> - <div class="container-fluid mx-sm-5"> - <div class="row"> - <div class="col-6 col-sm-4 text-xs-center order-sm-2"> - {{ with $links }} - {{ with index . "user"}} - {{ template "footer-links-block" . }} - {{ end }} - {{ end }} - </div> - <div class="col-6 col-sm-4 text-right text-xs-center order-sm-3"> - {{ with $links }} - {{ with index . "developer"}} - {{ template "footer-links-block" . }} - {{ end }} - {{ end }} - </div> - <div class="col-12 col-sm-4 text-center py-2 order-sm-2"> - {{ with $links }} {{ with index . "image"}}<small><a class="text-white" href="{{ .image_url }}">{{ .text }}</a></small>{{ end }}{{ end }} - <p class="text-white"> - {{ with .Site.Params.copyright }}© {{ now.Year}} {{ .}}{{ end }} <br/> - {{ with $links }}{{ with index . "impress"}}<a class="text-white" href="{{ .url }}">{{ .text }}</a>{{ end }}{{ end }} - </p> - <!-- {{ if not .Site.Params.ui.footer_about_disable }} - {{ with .Site.GetPage "about" }}<p class="mt-2"><a href="{{ .RelPermalink }}">{{ .Title }}</a></p>{{ end }} - {{ end }} --> - </div> - </div> - </div> -</footer> - -{{ define "footer-links-block" }} -<ul class="list-inline mb-0"> - {{ range . }} - <li class="list-inline-item mx-2 h3" data-toggle="tooltip" data-placement="top" title="{{ .name }}" aria-label="{{ .name }}"> - <a class="text-white" target="_blank" rel="noopener" href="{{ .url }}" aria-label="{{ .name }}"> - <i class="{{ .icon }}"></i> - </a> - </li> - {{ end }} -</ul> -{{ end }} diff --git a/layouts/partials/page-meta-lastmod.html b/layouts/partials/page-meta-lastmod.html deleted file mode 100644 index 44c19adbf5535732cd00c9006d8e53063ef7587e..0000000000000000000000000000000000000000 --- a/layouts/partials/page-meta-lastmod.html +++ /dev/null @@ -1 +0,0 @@ -<!-- {{ T "post_last_mod"}} {{ .Lastmod.Format .Site.Params.time_format_default }}{{ with .GitInfo }}: <a href="{{ $.Site.Params.github_repo }}/commit/{{ .Hash }}">{{ .Subject }} ({{ .AbbreviatedHash }})</a>{{end }} --> diff --git a/layouts/shortcodes/blocks/cover.html b/layouts/shortcodes/blocks/cover.html deleted file mode 100644 index f7a540b4ae865c662558f81ad9e796ca8758b193..0000000000000000000000000000000000000000 --- a/layouts/shortcodes/blocks/cover.html +++ /dev/null @@ -1,50 +0,0 @@ -{{ $_hugo_config := `{ "version": 1 }` }} -{{ $blockID := printf "td-cover-block-%d" .Ordinal }} -{{ $promo_image := (.Page.Resources.ByType "image").GetMatch "**background*" }} -{{ $logo_image := (.Page.Resources.ByType "image").GetMatch "**logo*" }} -{{ $col_id := .Get "color" | default "dark" }} -{{ $image_anchor := .Get "image_anchor" | default "smart" }} -{{ $logo_anchor := .Get "logo_anchor" | default "smart" }} -{{/* Height can be one of: auto, min, med, max, full. */}} -{{ $height := .Get "height" | default "max" }} -{{ $byline := .Get "byline" | default "" }} -{{ with $promo_image }} -{{ $promo_image_big := (.Fill (printf "1920x1080 %s" $image_anchor)) }} -{{ $promo_image_small := (.Fill (printf "960x540 %s" $image_anchor)) }} -<link rel="preload" as="image" href="{{ $promo_image_small }}" media="(max-width: 1200px)"> -<link rel="preload" as="image" href="{{ $promo_image_big }}" media="(min-width: 1200px)"> -<style> -#{{ $blockID }} { - background-image: url({{ $promo_image_small }}); -} -@media only screen and (min-width: 1200px) { - #{{ $blockID }} { - background-image: url({{ $promo_image_big }}); - } -} -</style> -{{ end }} -<section id="{{ $blockID }}" class="row td-cover-block td-cover-block--height-{{ $height }} js-td-cover td-overlay td-overlay--dark -bg-{{ $col_id }}"> - <div class="container td-overlay__inner"> - <div class="row"> - <div class="col-12"> - <div class="text-center"> - {{ with .Get "title" }}<h1 class="display-1 mt-0 mt-md-5 pb-4">{{ $title := . }}{{ with $logo_image }}{{ $logo_image_resized := (.Fit (printf "70x70 %s" $logo_anchor)) }}<img class="td-cover-logo" src="{{ $logo_image_resized }}" alt="{{ $title | html }} Logo">{{ end }}{{ $title | html }}</h1>{{ end }} - {{ with .Get "subtitle" }}<p class="display-2 text-uppercase mb-0">{{ . | html }}</p>{{ end }} - <div class="pt-3 lead"> - {{ if eq .Page.File.Ext "md" }} - {{ .Inner | markdownify }} - {{ else }} - {{ .Inner | htmlUnescape | safeHTML }} - {{ end }} - </div> - </div> - </div> - </div> - </div> - {{ if $byline }} - <div class="byline"> - <small>{{ $byline }}</small> - </div> - {{ end }} -</section> diff --git a/mindmap_gen/mindmap_gen.py b/mindmap_gen/mindmap_gen.py deleted file mode 100644 index 65b244ff7a2f3db1f45ebca92ebaecd4a0fdc2cd..0000000000000000000000000000000000000000 --- a/mindmap_gen/mindmap_gen.py +++ /dev/null @@ -1,111 +0,0 @@ -import glob -import re -import os -import argparse - - -class Entry: - - def __init__(self, dir_name, file_name, file_title, ref_count): - self.dir_name = dir_name - self.file_name = file_name - self.file_title = file_title - self.ref_count = ref_count - - @staticmethod - def get_root(): - return "Cryptographic Migration & Agility" - - def get_dir(self): - return self.dir_name - - def get_file(self): - return self.file_name - - def get_title(self): - return self.file_title - - def get_refs(self): - return self.ref_count - - -class MarkdownParser: - - def __init__(self, markdown_dir_path): - self.markdown_dir_path = markdown_dir_path - - def find_markdown_files(self): - return glob.glob(self.markdown_dir_path + '/**/*.md', recursive=True) - - def generate_mindmap_file(self): - md_files = self.find_markdown_files() - entries = [] - - # Iterate files and create entries - for md_file in md_files: - dir_name = self.get_md_dir_name(md_file) - file_name = self.get_md_file_name(md_file) - file_title = self.get_md_file_title(md_file) - ref_count = self.get_md_ref_count(md_file) - - if ref_count > 0: - entries.append(Entry(dir_name, file_name, file_title, ref_count)) - - # Write entries to file - f = open("mindmap_gen/mindmap.md", "w", encoding="utf8") - f.write(self.generate_mindmap(entries)) - f.close() - - def generate_mindmap(self, entries): - prev_dir = "" - mm_str = "" - mm_str += ("- " + entries[0].get_root() + "\n") - for entry in entries: - if entry.get_dir() != "agility" and entry.get_dir() != "migration": - continue - if entry.get_dir() == prev_dir: - if entry.get_dir() == "": - mm_str += (" - " + entry.get_title() + " (Refs: " + str(entry.get_refs()) + ")\n") - else: - mm_str += (" - " + entry.get_title() + " (Refs: " + str(entry.get_refs()) + ")\n") - else: - mm_str += (" - " + entry.get_dir().capitalize() + "\n") - mm_str += (" - " + entry.get_title() + " (Refs: " + str(entry.get_refs()) + ")\n") - prev_dir = entry.get_dir() - - return mm_str - - def get_md_file_title(self, md_file_path): - with open(md_file_path, 'r', encoding="utf8") as file: - data = file.read() - return re.search("title: \"(.*)\"", data).group(1) - - def get_md_file_name(self, md_file_path): - file_name = os.path.basename(md_file_path) - return file_name - - def get_md_dir_name(self, md_file_path): - dir_name = os.path.basename(os.path.dirname(md_file_path)) - if dir_name == "docs": - dir_name = "" - return dir_name - - def get_md_ref_count(self, md_file_path): - ref_regex = "\.\.\/refs#(.+)\)" - file_handle = open(md_file_path, mode='r', encoding ="utf8") - ref_count = 0 - - for line in file_handle.readlines(): - match = re.search(ref_regex, line) - if match is not None: - ref_count += 1 - return ref_count - - -parser = argparse.ArgumentParser() -parser.add_argument('-d', '--directory', help='Path to content directory', required=True) -args = parser.parse_args() -content_dir = args.directory - -md_parser = MarkdownParser(content_dir) -md_parser.generate_mindmap_file()