Commit c28d42ea authored by Nouri-Alnahawi's avatar Nouri-Alnahawi
Browse files

add new content and refs

parent 56be8e76
Pipeline #78066 passed with stages
in 1 minute and 35 seconds
......@@ -3,7 +3,7 @@ title: "Automation and Frameworks"
date: 2021-05-05T22:41:49+02:00
draft: false
type: docs
weight: 5
weight: 6
---
- RFC6916 PKIs process formalization:
- [Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI)](https://tools.ietf.org/html/rfc6916): RFC6916 formalizes the Migration Process for algorithm suites in the Resource Public Key Infrastructure [[GKT13]](../../refs#gkt13)
......
......@@ -3,7 +3,7 @@ title: "Performance Considerations"
date: 2021-05-05T22:41:49+02:00
draft: false
type: docs
weight: 2
weight: 3
---
Evaluation of the performance of PQC algorithms in various facets, classified into thethree subcategories: *Algorithm Performance, Network Performance, and Hardware Performance*
......
......@@ -3,7 +3,7 @@ title: "Algorithm Migration Process"
date: 2021-05-05T22:41:49+02:00
draft: false
type: docs
weight: 4
weight: 5
---
- Hybrid TLS & SSH Implementation:
- [Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/stebila-prototyping-post-quantum.pdf): Hybrid approach: Two or more independent algorithms chosen from both post-quantum, and classical schemes [[CPS19]](../../refs#cps19)
......
---
title: "PQ Security Protocols"
date: 2021-05-05T22:41:49+02:00
draft: false
type: docs
weight: 2
---
- Key Establishment:
- [Post-quantum MACsec in Ethernet Networks ](https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5973) Authenticated post-quantum key establishment protocol which is suitable for long-term secure MACsec. Hybrid mode, ephemeral key exchange, and an end-to-end encryption [[ChSe21]](../../refs#chse21).
......@@ -3,7 +3,7 @@ title: "Security Considerations"
date: 2021-05-05T22:41:49+02:00
draft: false
type: docs
weight: 3
weight: 4
---
##### **Algorithm, Parameter Selection and Tradeoffs**
- Key/sig. size tradeoffs:
......@@ -12,6 +12,8 @@ weight: 3
- [A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography](https://ieeexplore.ieee.org/document/9153901) Complexity analysis on isogeny-based, code-based and lattice-baced PQC schemes [[BRP20]](../../refs#brp20)
##### **Cryptanalysis**
- Formal verification:
- [Post-Quantum Verification of Fujisaki-Okamoto](https://link.springer.com/chapter/10.1007/978-3-030-64837-4_11) Computer-verified formalization of the post-quantum security proof of the Fujisaki-Okamoto transform [[Unr20]](../../refs#unr20)
- Anonymity:
- [NTRU leads to Anonymous, Robust Public-Key Encryption](https://eprint.iacr.org/2021/741.pdf) Solution to the open problem of the anonymity and robustness of NTRU [[Xag21]](../../refs#xag21)
- [Anonymous, Robust Post-Quantum Public Key Encryption](https://eprint.iacr.org/2021/708.pdf) Study of the anonymity and robustness of NIST finalists Classic McEliece, Kyber, NTRU and Saber [[GMP21]](../../refs#gmp21)
......
......@@ -3,7 +3,7 @@ title: "New Standards"
date: 2021-05-06T00:11:20+02:00
draft: false
type: docs
weight: 6
weight: 7
---
- NIST Report on Round 3 Finalists:
- [Status report on the second round of the NIST post-quantum cryptography standardization process](https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf): Third round finalists for public-key encryption / key-establishment algorithms and digital signatures [[MAA+20]](../../refs#maa20)
......
......@@ -111,12 +111,18 @@ weight: 8
###### [ChCh21]
[Chen, Ming-Shing, and Tung Chou. "Classic McEliece on the ARM Cortex-M4." IACR Cryptol. ePrint Arch. 2021 (2021): 492.](https://eprint.iacr.org/2021/492.pdf)
###### [ChSe21]
[Cho, J. Y., & Sergeev, A. (2021). Post-quantum MACsec in Ethernet Networks. Journal of Cyber Security and Mobility, 161-176.](https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5973)
###### [CFP+19]
[Casanova, J. C. Faugere, G. M. R. J. Patarin, L. Perret, and J. Ryckeghem.2019. GeMSS: a great multivariate short signature.Submission to NIST PQCcompetition Round-2(2019)](https://www-polsys.lip6.fr/Links/NIST/GeMSS_specification.pdf)
###### [CJL+16]
[L. Chen, S. Jordan, Y. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone.2016.Report on post-quantum cryptography. Vol. 12. US Department of Com-merce, National Institute of Standards and Technology](https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf)
###### [CMC19]
[Clancy, T. C., McGwier, R. W., & Chen, L. (2019, May). Post-quantum cryptography and 5G security: tutorial. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (pp. 285-285).](https://dl.acm.org/doi/abs/10.1145/3317549.3324882?casa_token=_HA-JzKBo2wAAAAA:ulj89qh94VJPx57x5Nm4QekITn3LORo9o76BX27-MV7wfrCkdx3LF1mUn54Byqa20EkQSH9dBDk93Q)
###### [CPS19]
[E. Crockett, C. Paquin, and D. Stebila. Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. 2019.](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/stebila-prototyping-post-quantum.pdf)
......@@ -183,6 +189,9 @@ weight: 8
###### [Hou15]
[R. Housley. Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms. RFC 7696, 2015.](https://tools.ietf.org/html/rfc7696)
###### [HPA21]
[Howe, J., Prest, T., & Apon, D. (2021). SoK: How (not) to Design and Implement Post-Quantum Cryptography. IACR Cryptol. ePrint Arch., 2021, 462.](https://eprint.iacr.org/2021/462.pdf)
###### [HPDM20]
[A. Holcomb, G. C. C. F. Pereira, B. Das, and M. Mosca. PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks. arXiv:2010.06571](https://arxiv.org/abs/2010.06571)
......@@ -237,6 +246,9 @@ weight: 8
###### [LLP+13]
[K. Lee, Y. Lee, J. Park, K. Yim and I. You, "Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)," 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013, pp. 709-713, doi: 10.1109/IMIS.2013.128](https://ieeexplore.ieee.org/document/6603762)
###### [LLJ20]
[Lohachab, A., Lohachab, A., & Jangra, A. (2020). A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet of Things, 9, 100174.](https://www.sciencedirect.com/science/article/abs/pii/S2542660520300159#!)
###### [MAA+20]
[D. Moody, G. Alagic, D. C Apon, D. A. Cooper, Q. H. Dang, J. M. Kelsey, Y.Liu, C. A. Miller, R. C. Peralta, R. A. Perlner, A. Y. Robinson, D. C. Smith-Tone,and J. Alperin-Sheriff. 2020. Status report on the second round of the NISTpost-quantum cryptography standardization process.](https://doi.org/10.6028/NIST.IR.8309)
......@@ -336,6 +348,9 @@ weight: 8
###### [TRH+20]
[Tujner, Z., Rooijakkers, T., van Heesch, M., & Önen, M. (2020). QSOR: Quantum-Safe Onion Routing. arXiv preprint arXiv:2001.03418](https://arxiv.org/abs/2001.03418)
###### [Unr20]
[Unruh, D. (2020, December). Post-quantum verification of Fujisaki-Okamoto. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 321-352). Springer, Cham.](https://link.springer.com/chapter/10.1007/978-3-030-64837-4_11)
###### [UWK15]
[M. Ullmann, C. Wieschebrink, and D. Kügler. Public key infrastructure and crypto agility concept for intelligent transportation systems. In Sulc, Noll (Eds.): VEHICULAR 2015: The Fourth International Conference on Advances in Vehicular Systems, Technologies and Applications. October 11-16, 2015, St. Julians, Malta, pages 14 – 19, 2015.](http://www.thinkmind.org/index.php?view=article&articleid=vehicular_2015_1_30_30028.)
......
......@@ -19,3 +19,6 @@ A collection of survey papers and references dealing with general challenges and
- [Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen](https://www.secumedia-shop.net/Deutschland-Digital-Sicher-30-Jahre-BSI): A brief evaluation of the current state of both post-quantum and quantum cryptography [[HLL+21]](../refs#hll21).
- [Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges](https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf): Important use cases for cryptography and potential migration strategies to transition to post-quantum cryptography [[CCD+15]](../refs#ccd15).
- [Migration to Post-Quantum Cryptography](https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/pqc-migration-project-description-draft.pdf): NCCoE and NIST Project description for PQC migration [[WiSo21]](../refs#wiso21).
- [A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks](https://www.sciencedirect.com/science/article/abs/pii/S2542660520300159#!) Open research challenges and future research directions in the field of IoT networks [[LLJ20]](../refs#llj20).
- [Post-quantum cryptography and 5G security: tutorial](https://dl.acm.org/doi/pdf/10.1145/3317549.3324882) On advancing the 3GPP 5G standards and NIST post-quantum cryptography standards in tandem, with the goal of launching a "quantum ready" 5G core network [[CMC19]](../refs#cmc19).
- [SoK: How (not) to Design and Implement Post-Quantum Cryptography](https://eprint.iacr.org/2021/462.pdf) Current state of knowledge on post-quantum cryptography. Trends, common methodologies, and pitfalls to look for and recurrent challenges [[HPA21]](../refs#hpa21).
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment