diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml index 9f52d17ce9952846c2bde241677c29408bfd749b..bd6cfd49c018efffe0380f0d4631b18b338a2f00 100644 --- a/.gitlab-ci.yml +++ b/.gitlab-ci.yml @@ -3,9 +3,6 @@ image: registry.gitlab.com/pages/hugo/hugo_extended variables: GIT_SUBMODULE_STRATEGY: recursive - MINDMAP_OUT_PATH: ./layouts/shortcodes/mindmap.html - MINDMAP_IN_PATH: ./mindmap_gen/mindmap.md - MINDMAP_SCRIPT_PATH: ./mindmap_gen/mindmap_gen.py HUGO_ENV: production .job_templae: &script @@ -14,12 +11,8 @@ variables: - npm update - npm install -D --save autoprefixer - npm install -D --save postcss-cli - - npm install -D --save markmap-lib - - npm install -D --save markmap-cli + script: - - python3 $MINDMAP_SCRIPT_PATH -d $(pwd)/content # Generate the mindmap md file - - npx markmap-cli -o $MINDMAP_OUT_PATH $MINDMAP_IN_PATH # Convert mindmap md file to html - - sed -i 's/100v/60v/g' $(pwd)/layouts/shortcodes/mindmap.html # Replaces the width and hight of mindmap with suitable values - hugo --minify --gc --environment production test: @@ -31,4 +24,4 @@ pages: paths: - public only: - - dev + - master diff --git a/content/background.jpg b/content/background.jpg deleted file mode 100644 index 91ddfe20e0214a88619dfd28ace110a891cc90b0..0000000000000000000000000000000000000000 Binary files a/content/background.jpg and /dev/null differ diff --git a/content/docs/List_Contributors.md b/content/docs/List_Contributors.md deleted file mode 100644 index 24ddaa61b61e3c497213c802806adb4f46d4a12e..0000000000000000000000000000000000000000 --- a/content/docs/List_Contributors.md +++ /dev/null @@ -1,23 +0,0 @@ ---- -title: "Contributors" -linktitle: "Contributors" -date: 2021-05-05T22:18:28+02:00 -draft: false -type: docs -weight: 10 ---- -This site was initiated by the research groups [Applied Cyber-Security](https://fbi.h-da.de/forschung/arbeitsgruppen/applied-cyber-security-darmstadt) and [User Centered Security](https://fbi.h-da.de/index.php?id=764) of [Darmstadt University of Applied Sciences](https://h-da.de/), funded by [ATHENE National Research Center for Applied Cybersecurity](https://www.athene-center.de). - -A list of the contributors: - -| Name | Affiliation | Contribution | -|--------------------------------|-------------|--------------| -|Alexander Wiesmaier|Darmstadt University of Applied Sciences|Original Paper / Community Site| -|Alexander Zeier|MTG AG Darmstadt|Original Paper| -|Andreas Heinemann|Darmstadt University of Applied Sciences|Original Paper| -|Dominik Heinz|Darmstadt University of Applied Sciences|Community Site / Development | -|Julian Geißler|Darmstadt University of Applied Sciences|Original Paper| -|Nouri Alnahawi|Darmstadt University of Applied Sciences|Original Paper / Community Site / Development / Updates | -|Pia Bauspieß|Darmstadt University of Applied Sciences|Original Paper| -|Robin Meunier|Darmstadt University of Applied Sciences|PQC Algorithm Specifications / Protocol Integration| -|Tobias Grasmeyer|Darmstadt University of Applied Sciences|Original Paper / Community Site / Development | diff --git a/content/docs/Mindmap.md b/content/docs/Mindmap.md deleted file mode 100644 index 037bd78ee84d2460bcddc645b5ab3008a680e753..0000000000000000000000000000000000000000 --- a/content/docs/Mindmap.md +++ /dev/null @@ -1,12 +0,0 @@ ---- -title: "Categorization Scheme" -linktitle: "Categorization Scheme" -date: 2021-05-05T22:20:34+02:00 -draft: false -type: docs -weight: 2 -menu: - main: - weight: 2 ---- -{{< mindmap >}} diff --git a/content/docs/_index.md b/content/docs/_index.md deleted file mode 100644 index 13c03d47cf6a45272d4d2aa63a808a5ce3a07a20..0000000000000000000000000000000000000000 --- a/content/docs/_index.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "Cryptographic Migration & Agility" -linktitle: "Cryptographic Migration & Agility" -date: 2021-05-05T22:20:34+02:00 -draft: false -type: docs ---- -An open community site for sharing any relevant research, findings, and solutions on PQC migration and cryptographic agility. diff --git a/content/docs/about.md b/content/docs/about.md deleted file mode 100644 index 5ad6d783724bacc921d644772ad8ce6c16e00318..0000000000000000000000000000000000000000 --- a/content/docs/about.md +++ /dev/null @@ -1,12 +0,0 @@ ---- -title: "About Cryptographic Migration & Agility" -linktitle: "About Cryptographic Migration & Agility" -date: 2021-05-05T22:17:54+02:00 -draft: false -type: docs -weight: 1 -menu: - main: - weight: 1 ---- -Post-quantum cryptographic schemes have been under development for several years. Very soon there will be standardized post-quantum algorithms replacing the previous standards, which will eventually become obsolete. In order for quantum-resistant cryptographic Measures to be utilized, one needs more than simply developing secure post-quantum algorithms. The migration towards PQC poses great challenges on different levels. Those are not only restricted to the integration into existing protocols, but also include performance issues such as hardware specifications and memory usage, and especially the uncertainty of long term security of the new algorithm families. Moreover, a major challenge lies within finding suitable means of communicating and negotiating new algorithms and protocol parameters between different IT-systems. This leads to the urgent need for establishing the concept of crypto-agility, so as to be prepared for the rapid changes of cryptography, and insure the compatibility in all possible scenarios and settings. diff --git a/content/docs/agility/_index.md b/content/docs/agility/_index.md deleted file mode 100644 index b034e58540abe8e868928ded21e74d835780c266..0000000000000000000000000000000000000000 --- a/content/docs/agility/_index.md +++ /dev/null @@ -1,9 +0,0 @@ ---- -title: "State of Agility" -linktitle: "State of Agility" -date: 2021-05-05T22:35:41+02:00 -draft: false -type: docs -weight: 5 ---- -Aspects regarding the notion of cryptographic agility diff --git a/content/docs/agility/development.md b/content/docs/agility/development.md deleted file mode 100644 index 1e42ab4b37e1c96bbda6bb6698a2d80c1bbc5cd8..0000000000000000000000000000000000000000 --- a/content/docs/agility/development.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -title: "Development Considerations" -linktitle: "Development Considerations" -date: 2021-05-06T00:12:02+02:00 -draft: false -type: docs -weight: 2 ---- -- Research on CA mechanism: - - [On the importance of cryptographic agility for industrial automation](https://www.degruyter.com/document/doi/10.1515/auto-2019-0019/html) This work motivates cryptographic agility by discussing the threat of quantum computers to modern cryptography [[PN19]](../../refs#pn19) - - [Security issues on the CNG cryptography library (Cryptography API: Next Generation)](https://ieeexplore.ieee.org/document/6603762) Next Generation from Microsoft to exchange cryptographic algorithms without any change to the code of the program [[LLP+13]](../../refs#llp13) - - [API Usability of Stateful Signature Schemes](https://link.springer.com/chapter/10.1007/978-3-030-26834-3_13) Easy-to-use API design for stateful signature schemes [[ZWH19]](../../refs#zwh19) -- CA as a design principle: - - [PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks](https://arxiv.org/abs/2010.06571) Proposes a redesign of Fabric's credential-management procedures and related specifications in order to incorporate hybrid digital signatures, protecting against both classical and quantum attacks using one classical and one quantum-safe signature [[HPDM20]](../../refs#hpdm20) - - [Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems](http://www.thinkmind.org/index.php?view=article&articleid=vehicular_2015_1_30_30028) This paper proposes a multi-domain PKI architecture for intelligent transportation systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, today [[UWK15]](../../refs#uwk15) -- Evaluation of crypto libs: - - [Comparing the Usability of Cryptographic APIs](https://ieeexplore.ieee.org/document/7958576) This paper is the first to examine both how and why the design and resulting usability of different cryptographic libraries affects the security of code written with them [[ABF+17]](../../refs#abf17) -- Evaluation of code examples for crypto libs: - - [Usability and Security Effects of Code Examples on Crypto APIs](https://ieeexplore.ieee.org/document/8514203) Platform for cryptographic code examples that improves the usability and security of created applications by non security experts [[MW18]](../../refs#mw18) - - [Fluid Intelligence Doesn't Matter! Effects of Code Examples on the Usability of Crypto APIs](https://arxiv.org/abs/2004.03973) Researches whether similarity and Gf also have an effect in the context of using cryptographic APIs [[MW20]](../../refs#mw20) -- Evaluation of documentation systems for crypto libs: - - [Zur Benutzbarkeit und Verwendung von API-Dokumentationen](https://dl.gi.de/handle/20.500.12116/33515) Showcases requirements for a good security API [[HZHW20]](../../refs#hzhw20) diff --git a/content/docs/agility/frontiers.md b/content/docs/agility/frontiers.md deleted file mode 100644 index 65dba631296339cbdd213d78c62831519af0c41a..0000000000000000000000000000000000000000 --- a/content/docs/agility/frontiers.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Frontiers of Cryptography" -linktitle: "Frontiers of Cryptography" -date: 2021-05-06T00:12:24+02:00 -draft: false -type: docs -weight: 5 ---- -- Blockchain: - - [Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency](https://ieeexplore.ieee.org/document/9043192) This research work presents basic analysis and the background understanding of Stateful Hash-based Signature Schemes, particularly the Lamport One-Time Signature Scheme, Winternitz One-Time Signature Scheme, and the Merkle Signature Scheme. [[NWAO19]](../../refs#nwao19) -- Satellites: - - [Quantum Resistant Authentication Algorithms for Satellite-Based Augmentation Systems](https://web.stanford.edu/group/scpnt/gpslab/pubs/papers/Neish_2018_IONITM_QuantumResistantAuthenticationUpdated.pdf) Introduces the cryptographic primitives necessary to understand the vulnerabilities in modern day cryptography due to quantum computing and investigates the use of TESLA and EC-Schnorr algorithms in broadcast systems. [[NWE19]](../../refs#nwe19) -- Cryptographic primitives: - - [Cryptographic Agility and its Relation to Circular Encryption](https://eprint.iacr.org/2010/117) Researches whether wPRFs (weak-PRFs) are agile and whether every secure (IND-R) encryption scheme is secure when encrypting cycles. [[ABBC10]](../../refs#abbc10) diff --git a/content/docs/agility/incentives.md b/content/docs/agility/incentives.md deleted file mode 100644 index 1119aa1d8c2e2b8ae8d29b672e4c25e9215a93c3..0000000000000000000000000000000000000000 --- a/content/docs/agility/incentives.md +++ /dev/null @@ -1,14 +0,0 @@ ---- -title: "Incentives" -linktitle: "Incentives" -date: 2021-05-06T00:12:16+02:00 -draft: false -type: docs -weight: 4 ---- -- Ranking by best practice as incentive: - - [Biggest Failures in Security](https://drops.dagstuhl.de/opus/volltexte/2020/11981/) Tries to identify the "biggest failures" in security and to get a comprehensive understanding on their overall impact on security. [[AVVY19]](../../refs#avvy19) -- Best practice for agility in protocols: - - [Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms](https://tools.ietf.org/html/rfc7696) Provides guidelines to ensure that protocols have the ability to migrate from one mandatory-to-implement algorithm suite to another over time. [[Hou15]](../../refs#hou15) -- Building blocks of crypto-agility: - - [On the importance of cryptographic agility for industrial automation](https://www.degruyter.com/document/doi/10.1515/auto-2019-0019/html) This work motivates cryptographic agility by discussing the threat of quantum computers to moderncryptography. [[PN19]](../../refs#pn19) diff --git a/content/docs/agility/modalities.md b/content/docs/agility/modalities.md deleted file mode 100644 index a84eaae9c467410b5554efb5d2b0e6c84bfd75a9..0000000000000000000000000000000000000000 --- a/content/docs/agility/modalities.md +++ /dev/null @@ -1,19 +0,0 @@ ---- -title: "Modalities" -linktitle: "Modalities" -date: 2021-05-06T00:11:45+02:00 -draft: false -type: docs -weight: 1 ---- -- New agile protocols: - - [Security Agility Solution Independent of the Underlaying Protocol Architecture](https://www.semanticscholar.org/paper/Security-Agility-Solution-Independent-of-the-Vasic-Mikuc/489054a1f28eb26b1baa1a9f0caff2306c821695) The agilecryptographic negotiation protocol (ACNP) proposed in this paper repre-sents a layer-agnostic, robust solution that can be deployed for providingcryptographic agility and greatly improve security. [[VM12]](../../refs#vm12) - - [Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency](https://ieeexplore.ieee.org/document/9043192) This research work presents basic analysis and the background understanding of Stateful Hash-based Signature Schemes, particularly the Lamport One-Time Signature Scheme, Winternitz One-Time Signature Scheme, and the Merkle Signature Scheme. [[NWAO19]](../../refs#nwao19) - - [Post-Quantum TLS without Handshake Signatures](https://eprint.iacr.org/2020/534.pdf) KEMTLS alternative handshake for TLS 1.3 using KEMs [[SSW20]](../../refs#ssw20) -- Enhance existing protocols for use with PQC: - - [Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Algorithm Agility](https://tools.ietf.org/html/rfc8636.html) This document updates the Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) standard (RFC 4556) to remove protocol structures tied to specific cryptographic algorithms. [[AZCH19]](../../refs#azch19) - - [The Secure Socket API: TLS as an Operating System Service](https://www.usenix.org/conference/usenixsecurity18/presentation/oneill) We explore the use of the standard POSIX socket API as a vehicle for a simplified TLS API, while also giving administrators the ability to control applications and tailor TLS configuration to their needs. [[OHW+18]](../../refs#ohw18) -- Enhance existing infrastructure for PQC: - - [Algorithm Agility – Discussion on TPM 2.0 ECC Functionalities](https://link.springer.com/chapter/10.1007%2F978-3-319-49100-4_6) In this paper, we review all the TPM 2.0 ECC functionalities, and discuss on whether the existing TPM commands can be used to implement new cryptographic algorithms which have not yet been addressed in the specification. [[CU16]](../../refs#cu16) - - [Fail-Safe-Konzept für Public-Key-Infrastrukturen](https://tuprints.ulb.tu-darmstadt.de/246/) In dieser Dissertation wird ein Fail-Safe-Konzept für Public-Key-Infrastrukturen vorgestellt. [[Mas02]](../../refs#mas02) - - [Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems](http://www.thinkmind.org/index.php?view=article&articleid=vehicular_2015_1_30_30028) This paper proposes a multi-domain PKI architecture for intelligent transportation systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, today. [[UWK15]](../../refs#uwk15) diff --git a/content/docs/agility/testing.md b/content/docs/agility/testing.md deleted file mode 100644 index 439f13749e3ce134d4d2aa90736c803ebaba1b01..0000000000000000000000000000000000000000 --- a/content/docs/agility/testing.md +++ /dev/null @@ -1,10 +0,0 @@ ---- -title: "Testing" -linktitle: "Testing" -date: 2021-05-06T00:12:09+02:00 -draft: false -type: docs -weight: 3 ---- -- Algorithm relations for better test coverage: - - [Systematic Testing of Post-Quantum Cryptographic Implementations Using Metamorphic Testing](https://ieeexplore.ieee.org/document/8785645) Investigates the effectiveness of a systematic testing approach for discovering bugs in highly complex cryptographic algorithm implementations. [[PRKK19]](../../refs#prkk19) diff --git a/content/docs/contributing.md b/content/docs/contributing.md deleted file mode 100644 index 40d2b98aeefec2ef0f588cb09ba72d5284e1cad3..0000000000000000000000000000000000000000 --- a/content/docs/contributing.md +++ /dev/null @@ -1,31 +0,0 @@ ---- -title: "How to Contribute" -linktitle: "How to Contribute" -date: 2021-05-05T22:18:28+02:00 -draft: false -type: docs -weight: 9 ---- -Your contributions are always welcome! - -To contribute to this site fork our repository on [Gitlab](https://gitlab.com/pqc-cma/cma) and send a merge request (aka pull request) with your update. - -#### How-To -This site uses the Hugo Docsy Documentation theme. All pages are in Markdown and can be edited with any normal text editor. To add new references or any useful material you need to visit the Gitlab repository, fork the project, and then edit the files you wish to update. After that just send a merge request with your commit. You may also create new pages if your contribution doesn't fit into any of the existing pages. Please pay attention to the syntax and formatting. In case you are not sure how to do so, just try, and we can gladly correct any mistakes in your merge request. - -#### Guidelines - -* Use the development branch. -* Add one link per Pull Request. - * Make sure the PR title is in the format of `Add project-name`. - * Write down the reason why the contribution is suitable. -* Add the link: `* [project-name](http://example.com/) - A short description ends with a period.` - * Keep descriptions concise and **short**. -* Add a section if needed. - * Add the section description. - * Add the section title to Table of Contents. -* Search previous Pull Requests or Issues before making a new one, as yours may be a duplicate. -* Check your spelling and grammar. -* Remove any trailing whitespace. - -P.S: Contributions aren't restricted to the members of the faculty at our university! diff --git a/content/docs/libraries.md b/content/docs/libraries.md deleted file mode 100644 index e789c8a5316faca278cdbbf698492df4687a1d22..0000000000000000000000000000000000000000 --- a/content/docs/libraries.md +++ /dev/null @@ -1,36 +0,0 @@ ---- -title: "Cryptographic Libraries and Interfaces" -linktitle: "Cryptographic Libraries and Interfaces" -date: 2021-05-06T00:13:06+02:00 -draft: false -type: docs -weight: 7 -menu: - main: - weight: 4 ---- -- [liboqs](https://github.com/open-quantum-safe/liboqs): -An open source C library for quantum-safe cryptographic algorithms. - -- [PQClean](https://github.com/PQClean/PQClean): -Portable C implementations of post-quantum cryptography. - -- [The Legion of the Bouncy Castle](https://www.bouncycastle.org/specifications.html): -Java implementation of cryptographic algorithms containing a light-weight API suitable for use in any environment. - -- [NaCL (Salt)](https://nacl.cr.yp.to/): -Software library for network communication, encryption, decryption, signatures, etc. - -- [Libsodium](https://libsodium.gitbook.io/doc/): -Portable, cross-compilable, installable, packageable fork of NaCl, with a compatible API software library for encryption, decryption, signatures, password hashing etc. - -- [LibHydrogen](https://github.com/jedisct1/libhydrogen): -Lightweight crypto library for constrained environments. - -- [WASI Cryptography APIs](https://github.com/WebAssembly/wasi-crypto): -Development of cryptography API proposals for the WASI Subgroup of the [WebAssembly Community Group](https://www.w3.org/community/webassembly/) - -- [Botan: Crypto and TLS for Modern C++](https://botan.randombit.net/) A C++ cryptographic library implementing a range of practical systems, such as TLS protocol, X.509 certificates, modern AEAD ciphers, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes. Several other language bindings are available, including Python. Versions of Botan that are approved by the BSI can be found on the [Github repository](https://github.com/Rohde-Schwarz/botan) - -- [eUCRITE API](https://cspub.h-da.io/eucrite/): -(Usable Cryptographic Interface) is a crypto API that places special emphasis on usability and security. Developed by the Applied Cyber-Security and User-Centered Security research groups at Darmstadt University of Applied Sciences. diff --git a/content/docs/migration/_index.md b/content/docs/migration/_index.md deleted file mode 100644 index 46afe95f5f9c8eb48fff977deb0a0fe8c0b5a9ec..0000000000000000000000000000000000000000 --- a/content/docs/migration/_index.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "State of Migration" -linktitle: "State of Migration" -date: 2021-05-05T22:35:41+02:00 -draft: false -type: docs -weight: 4 ---- diff --git a/content/docs/migration/algorithms/_index.md b/content/docs/migration/algorithms/_index.md deleted file mode 100644 index 8185efa9a65a86000049ed4f29a1db76010e4140..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/_index.md +++ /dev/null @@ -1,34 +0,0 @@ ---- -title: "PQC Algorithms" -date: 2021-05-05T22:41:49+02:00 -draft: false -weight: 1 -layout: no_index ---- -The current state of PQC is represented by the ongoing [NIST PQC standardization process](https://www.nist.gov/pqcrypto) -- [Report on post-quantum cryptography](https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf) [[CJL+16]](../../refs#cjl16). -- [Status report on the first round](https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8240.pdf) [[AASA+19]](../../refs#aasa19). -- [ Status report on the second round](https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf) [[MAA+20]](../../refs#maa20). - -#### **NIST PQC candidate algorithms:** - -| Algorithm | Description | Type | NIST Round | -|-------------------------------------|-------------|------|------------| -| [BIKE]({{< ref "/bike" >}} "BIKE") | Bit flipping key-encapsulation based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check) [[ABB+20]](../../refs#abb20) | Public-key Encryption and Key-establishment | Round Three Alternative | -| [CRYSTALS-Dilithium]({{< ref "/dilithium" >}} "CRYSTALS-Dilithium") | Digital signature scheme based on the hardness of lattice problems over module lattices [[DKL+21]](../../refs#dkl21) | Digital Signature | Round 3 Finalist | -| [Falcon]({{< ref "/falcon" >}} "Falcon") | Lattice-based signature scheme based on the short integer solution problem (SIS) over NTRU lattices [[FHK+20]](../../refs#fhk20) | Digital Signature | Round 3 Finalist | -| [FrodoKEM]({{< ref "/frodo" >}} "FrodoKEM")| Key-encapsulation from generic lattices [[NAB+21]](../../refs#nab21) | Public-key Encryption and Key-establishment | Round Three Alternative | -| [GeMSS]({{< ref "/gemss" >}} "GeMSS") | Multivariate signature scheme producing small signatures [[CFP+19]](../../refs#cfp19) | Digital Signature | Round Three Alternative | -| [HQC]({{< ref "/hqc" >}} "HQC") | Hamming quasi-cyclic code-based public-key encryption scheme [[MAB+21]](../../refs#mab21) | Public-key Encryption and Key-establishment | Round Three Alternative | -| [CRYSTALS-Kyber]({{< ref "/kyber" >}} "KYBER")| IND-CCA2-secure key-encapsulation mechanism (KEM) based on hard problems over module lattices [[ABD+21]](../../refs#abd21)| Public-key Encryption and Key-establishment | Round 3 Finalist | -| [Classic McEliece]({{< ref "/mceliece" >}} "Classic McEliece") | Code-based public-key cryptosystem based on random binary Goppa codes [[CCU+20]](../../refs#ccu20) | Public-key Encryption and Key-establishment | Round 3 Finalist | -| [NTRU]({{< ref "/ntru" >}} "NTRU") | Public-key cryptosystem based on lattice-based cryptography [[CDH+19]](../../refs#cdh19) | Public-key Encryption and Key-establishment | Round 3 Finalist | -| [NTRU-Prime]({{< ref "/prime" >}} "NTRU-Prime") | Small lattice-based key-encapsulation mechanism (KEM) [[BBC+20]](../../refs#bbc20) | Public-key Encryption and Key-establishment | Round 3 Alternative | -| [Picnic]({{< ref "/picnic" >}} "Picnic") | Digital signature algorithm based on the zero-knowledge proof system and symmetric key primitives [[CDG+17]](../../refs#cdg17) | Digital Signature | Round 3 Alternative | -| [Rainbow]({{< ref "/rainbow" >}} "Rainbow")| Public-key cryptosystem based on the hardness of solving a set of random multivariate quadratic systems [[DS05]](../../refs#ds05) | Digital Signature | Round 3 Finalist | -| [SABER]({{< ref "/saber" >}} "SABER") | IND-CCA2-secure key-encapsulation mechanism (KEM) based on the hardness of the module learning with rounding problem (MLWR) [[DKR+19]](../../refs#dkr19) | Public-key Encryption and Key-establishment | Round 3 Finalist | -| [SIKE]({{< ref "/sike" >}} "SIKE")| Isogeny-based key-encapsulation suite based on pseudo-random walks in supersingular isogeny graphs [[CCH+20]](../../refs#cch20) | Public-key Encryption and Key-establishment | Round 3 Alternative | -| [SPHINCS+]({{< ref "/sphincs" >}} "SPHINCS+") | A stateless hash-based signature scheme [[BHK+19]](../../refs#bhk19) | Digital Signature | Round 3 Alternative | -|| -| [NewHope](https://newhopecrypto.org/) | Key-exchange protocol based on the Ring-Learning-with-Errors (Ring-LWE) problem [[ADPS16]](../../refs#adps16) | Public-key Encryption and Key-establishment | Round Two | -| [qTESLA](https://qtesla.org/) | Signature scheme based on the hardness of the decisional ring learning with errors (R-LWE) problem [[ABB+20]](../../refs#abb20) | Digital Signature | Round Two | diff --git a/content/docs/migration/algorithms/all/bike.md b/content/docs/migration/algorithms/all/bike.md deleted file mode 100644 index 90f65e3e93b8359437d17cb5af0faa0c52738500..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/bike.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "BIKE" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 1 ---- -[BIKE](https://bikesuite.org/) is a bit flipping key encapsulation based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check). diff --git a/content/docs/migration/algorithms/all/dilithium.md b/content/docs/migration/algorithms/all/dilithium.md deleted file mode 100644 index e309c09c2a698e36da81c0e86564b7f1bda5fe60..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/dilithium.md +++ /dev/null @@ -1,19 +0,0 @@ ---- -title: "CRYSTALS-Dilithium" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 2 ---- -[CRYSTALS-Dilithium](https://pq-crystals.org/dilithium/) is a digital signature scheme based on the hardness of the shortest vector (SVP) problem over module lattices. - -- Required parameter for definiteness: - - $\tau$: Positive integer - -- Non-required parameter for definiteness: - - $q$: Positive integer (always $8380417$) - - $d$: Positive integer (always $13$) - - $\gamma_1$: Positive integer - - $\gamma_2$: Positive float - - $(k,l)$: Positive integer - - $\eta$: Positive integer diff --git a/content/docs/migration/algorithms/all/falcon.md b/content/docs/migration/algorithms/all/falcon.md deleted file mode 100644 index 49878f5cdff9b7f4d426fbca3c8bdf6773b8112a..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/falcon.md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "Falcon" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 3 ---- -[Falcon](https://falcon-sign.info/) is a lattice-based signature scheme based on the short integer solution problem (SIS) over NTRU lattices. - -- Required parameter for definiteness: - - $n$: Positive integer - -- Required parameter for definiteness: - - $q$: Positive integer (always $12289$) - - $\sigma$: Positive float - - $\sigma_{min}$: Positive float - - $\sigma_{max}$: Positive float - - $\lfloor \beta^{2} \rfloor$: Positive integer diff --git a/content/docs/migration/algorithms/all/frodo.md b/content/docs/migration/algorithms/all/frodo.md deleted file mode 100644 index a22bcbbcb41d0230632832277489303fa182e3b2..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/frodo.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "FrodoKEM" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 4 ---- -[FrodoKEM](https://frodokem.org/) is a key-encapsulation based on generic lattices. diff --git a/content/docs/migration/algorithms/all/gemss.md b/content/docs/migration/algorithms/all/gemss.md deleted file mode 100644 index 04fbc1fdfd72859bfeda0857d30efad129472472..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/gemss.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "GeMSS" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 5 ---- -[GeMSS](https://www-polsys.lip6.fr/Links/NIST/GeMSS.html) is a multivariate signature scheme that produces small signatures. diff --git a/content/docs/migration/algorithms/all/hqc.md b/content/docs/migration/algorithms/all/hqc.md deleted file mode 100644 index 9b035ba390471b1360a58069b8b1c5b5cc63377a..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/hqc.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "HQC" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 6 ---- -[HQC](http://pqc-hqc.org/) is a Hamming quasi-cyclic code-based public-key encryption scheme. diff --git a/content/docs/migration/algorithms/all/kyber.md b/content/docs/migration/algorithms/all/kyber.md deleted file mode 100644 index 1aa891ddd6c2fb9dfebbb712bb2044be1bd6d5e3..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/kyber.md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "CRYSTALS-Kyber" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 7 ---- -[CRYSTALS-Kyber](https://pq-crystals.org/kyber/) is a key-encapsulation mechanism (KEM) based on the learning with errors (LWE) problem over module lattices. - -- Required parameter for definiteness: - - $k$: Positive integer - -- Non-required parameter for definiteness: - - $n$: Positive integer - - $q$: Positive integer - - $\eta_1$: Positive integer - - $\eta_2$: Positive integer - - $(d_1, d_2)$: Positive integer diff --git a/content/docs/migration/algorithms/all/mceliece.md b/content/docs/migration/algorithms/all/mceliece.md deleted file mode 100644 index dac16ccfb914d030eb399c1d3e9a933232392a11..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/mceliece.md +++ /dev/null @@ -1,19 +0,0 @@ ---- -title: "Classic McEliece" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 8 ---- -[Classic McEliece](https://classic.mceliece.org/) is a code-Based public-key cryptosystem based on linear decoding problem of random binary Goppa codes. - -- Required parameter for definiteness: - - $m$: Positive integer - - $n$: Positive integer - - $t$: Positive integer - - $\mu$: Integer (default 0) - - $\nu$: Integer (default 0) - -- Non-required parameter for definiteness: - - $f(z)$: Polynomial - - $F(z)$: Polynomial diff --git a/content/docs/migration/algorithms/all/ntru.md b/content/docs/migration/algorithms/all/ntru.md deleted file mode 100644 index 125671b001cd7096ba6481add248e1db252386c4..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/ntru.md +++ /dev/null @@ -1,15 +0,0 @@ ---- -title: "NTRU" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 9 ---- -[NTRU](https://ntru.org/) is a public-key cryptosystem based on the lattice shortest vector problem (SVP). - -- Required parameter for definiteness: - - $n$: Positive integer - - $q$: Positive integer - -- Non-required parameter for definiteness: - - $p$: Positive integer (always $3$) diff --git a/content/docs/migration/algorithms/all/picnic.md b/content/docs/migration/algorithms/all/picnic.md deleted file mode 100644 index 8392aa4f7592d3f6bff083f1972015c22ddccd7c..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/picnic.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "Picnic" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 10 ---- -[Picnic](https://microsoft.github.io/Picnic/) digital signature algorithm based on the zero-knowledge proof system and symmetric key primitives. diff --git a/content/docs/migration/algorithms/all/prime.md b/content/docs/migration/algorithms/all/prime.md deleted file mode 100644 index 4ab86c23b0060ce343e784ea1bf0b3a8082771db..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/prime.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "NTRU-Prime" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 11 ---- -[NTRU-Prime](https://ntruprime.cr.yp.to/) is a small lattice-based key-encapsulation mechanism (KEM). diff --git a/content/docs/migration/algorithms/all/rainbow.md b/content/docs/migration/algorithms/all/rainbow.md deleted file mode 100644 index e5a177915d95caad7844e3da75485d26a5b66f49..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/rainbow.md +++ /dev/null @@ -1,16 +0,0 @@ ---- -title: "Rainbow" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 12 ---- -[Rainbow](https://www.pqcrainbow.org/) is a public-key cryptosystem based on the hardness of solving a set of random multivariate quadratic systems. - -- Required parameter for definiteness: - - $\nu_1$: Positive integer - -- Required parameter for definiteness: - - $\mathbb{F}$: Galois-Field (either $GF(16)$ or $GF(256)$) - - $o_1$: Positive integer - - $o_2$: Positive integer diff --git a/content/docs/migration/algorithms/all/saber.md b/content/docs/migration/algorithms/all/saber.md deleted file mode 100644 index e88e4e4201f4debee8cc150d8310e06ca62c48db..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/saber.md +++ /dev/null @@ -1,18 +0,0 @@ ---- -title: "SABER" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 13 ---- -[SABER](https://www.esat.kuleuven.be/cosic/pqcrypto/saber/) is a key-encapsulation mechanism (KEM) based on the hardness of the module learning with rounding problem (MLWR). - -- Required parameter for definiteness: - - $l$: Positive integer - -- Non-required parameter for definiteness: - - $n$: Positive integer (always $256$) - - $q$: Positive integer (always $2^{13}$) - - $p$: Positive integer (always $2^{10}$) - - $T$: Positive integer - - $\mu$: positiver Integer diff --git a/content/docs/migration/algorithms/all/sike.md b/content/docs/migration/algorithms/all/sike.md deleted file mode 100644 index bf5a6a2ef34a764d3b24b839e3207c2203c8cba5..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/sike.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "SIKE" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 14 ---- -[SIKE](https://sike.org/) is an isogeny-based key-encapsulation suite based on pseudo-random walks in supersingular isogeny graphs. diff --git a/content/docs/migration/algorithms/all/sphincs.md b/content/docs/migration/algorithms/all/sphincs.md deleted file mode 100644 index 1d29b0b7a6010cdfad96d9f1524416e2dbb1facd..0000000000000000000000000000000000000000 --- a/content/docs/migration/algorithms/all/sphincs.md +++ /dev/null @@ -1,10 +0,0 @@ ---- -title: "SPHINCS+" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 15 ---- -[SPHINCS+](https://sphincs.org/) a stateless hash-based signature scheme. - -[Round 3 Submission](https://sphincs.org/data/sphincs+-round3-specification.pdf) diff --git a/content/docs/migration/automation.md b/content/docs/migration/automation.md deleted file mode 100644 index f72c99c820820b8c1f5d00518ff1412bccc7896a..0000000000000000000000000000000000000000 --- a/content/docs/migration/automation.md +++ /dev/null @@ -1,11 +0,0 @@ ---- -title: "Automation and Frameworks" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 6 ---- -- RFC6916 PKIs process formalization: - - [Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI)](https://tools.ietf.org/html/rfc6916): RFC6916 formalizes the Migration Process for algorithm suites in the Resource Public Key Infrastructure [[GKT13]](../../refs#gkt13) -- Muckle protocol security analysis: - - [Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange](https://eprint.iacr.org/2020/099.pdf): Framework for the security analysis of hybrid authenticated key exchange protocols and Introduction of the Muckle protocol [[DHP20]](../../refs#dhp20) diff --git a/content/docs/migration/performance.md b/content/docs/migration/performance.md deleted file mode 100644 index 548220d441474aec3e17b6ce425ff14dccbc06bc..0000000000000000000000000000000000000000 --- a/content/docs/migration/performance.md +++ /dev/null @@ -1,63 +0,0 @@ ---- -title: "Performance Considerations" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 3 ---- -Evaluation of the performance of PQC algorithms in various facets, classified into thethree subcategories: *Algorithm Performance, Network Performance, and Hardware Performance* - -##### **Algorithm Performance** -- PQC evaluation on selected hardware: - - [On Feasibility of Post-Quantum Cryptography on Small Devices](https://www.sciencedirect.com/science/article/pii/S2405896318308474) Experimental post-quantum cryptography implementations on small devices with different platforms [[MPD+18]](../../refs#mpd18) - - [Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms](https://link.springer.com/chapter/10.1007/978-3-030-41025-4_8) Evaluation of the NIST candidates regarding their suitability for the implementation on special hardware platforms [[MRD+20]](../../refs#mrd20) - - [Rainbow on Cortex-M4](https://kannwischer.eu/papers/2021_rainbowm4.pdf) Cortex-M4 implementation of the NIST PQC signature finalist Rainbow [[TKY21]](../../refs#tky21) - - [Classic McEliece on the ARM Cortex-M4](https://eprint.iacr.org/2021/492.pdf) Constant-time implementation of Classic McEliece for ARM Cortex-M4 [[ChCh21]](../../refs#chch21) - - [Verifying Post-Quantum Signatures in 8 kB of RAM](https://kannwischer.eu/papers/2021_streamingpqc.pdf) Verification of NIST PQC round-3 signature scheme candidates Dilithium, Falcon, Rainbow, GeMSS, and SPHINCS+ [[GHK+21]](../../refs#ghk21) -- Improvements to PQC algorithms: - - [Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors](https://ieeexplore.ieee.org/abstract/document/9238630?casa_token=j7T_SBR8ECgAAAAA:Skx0Ze-JY3YP5CSLn20TOmrWviAP_-aUZ0b9W_gpR5fDpO8AWLigR52JC4qZVPTbLlIzv-3p2g) 52% and 83% improvement in performance for the CRYSTALS-Kyber KEM SHA3 variant and AES variant through Vectorization [[KKP20]](../../refs#kkp20) - - [Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4](http://link.springer.com/10.1007/978-3-030-23696-0_11) Optimized software implementation of Kyber for the ARM Cortex-M4 microcontroller [[BKS19]](../../refs#bks19) - - [CTIDH: Faster Constant-Time CSIDH](https://eprint.iacr.org/2021/633.pdf) Speed records for constant-time CSIDH (Commutative Supersingular Isogeny Diffie–Hellman) through combining a new key space with a new algorithm [[BBC+21]](../../refs#bbc21) - - [BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures](https://publications.cispa.saarland/3417/1/Buff.pdf) In-depth analysis of the NIST signature scheme candidates with respect to their security properties beyond unforgeability [[CDF+21]](../../refs#cdf21) -- PQC evaluation on selected architectures: - - [Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication](https://link.springer.com/chapter/10.1007/978-3-030-59013-0_15) Two solutions for the integration of PQ primitives into the industrial protocol Open Platform Communications Unified Architecture (OPC UA) [[PASC20]](../../refs#pasc20) - - [Incorporating Post-Quantum Cryptographyin a Microservice Environment](https://homepages.staff.os3.nl/~delaat/rp/2019-2020/p13/report.pdf) On the practical feasibility of using PQCin a microservice architecture [[WvdG20]](../../refs#wvdg20) - - [Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms](https://www.hindawi.com/journals/scn/2018/9846168/) Implementation of several lattice-based encryption schemes and public-key exchange protocols including Lizard, ring-Lizard, Kyber, Frodo, and NewHope in JavaScript [[YXF+18]](../../refs#yxf18) -- PQC evaluation in IoT: - - [From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things](https://ieeexplore.ieee.org/abstract/document/8932459) A wide view of post-quantum IoT security and give useful guidelines [[FC20]](../../refs#fc20) -- PQC evaluation in Distributed Ledger: - - [Evaluation of Post-Quantum Distributed Ledger Cryptography](https://jbba.scholasticahq.com/article/7679.pdf): Performance evaluation of qTesla in BC and DLTs [[Cam19]](../../refs#cam19) - -##### **Hardware Performance** -- Hardware implementations: - - [NIST Post-Quantum Cryptography - A Hardware Evaluation Study](https://eprint.iacr.org/2019/047) A hardware-based comparison of the NIST PQC candidates [[BSNK19]](../../refs#bsnk19) - - [Hardware Deployment of Hybrid PQC](https://eprint.iacr.org/2021/541.pdf) Small architecture for quantum-safe hybrid key exchange targeting ECDH and SIKE [[AEK+21]](../../refs#aek21) -- Performance critical use cases: - - [Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography](https://ieeexplore.ieee.org/document/9020384) Improved unconventional-radix finite-field multiplication (IFFM) algorithm reducing computational complexity by about 20% [[TLW19]](../../refs#tlw19) -- FPGA performance benefits: - - [Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co-design approaches](https://cryptography.gmu.edu/athena/PQC/GMU_PQC_2020_SW_HW.pdf) Methodology for implementing and benchmarking PQC candidates usingboth hardware and software/hardware co-design approaches [[DFA+20]](../../refs#dfa20) - - [Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves](https://ieeexplore.ieee.org/abstract/document/7725935) Isogeny-based schemes can be implemented with high efficiency on reconfigurable hardware [[KAMJ17]](../../refs#kamj17) - - [Post-Quantum Secure Boot](https://ieeexplore.ieee.org/document/9116252) Post-quantum secure boot solution implemented fully as hardware for reasons of security and performance [[KGC+20]](../../refs#kgc20) - - [Efficient and Scalable FPGA-Oriented Design of QC-LDPC Bit-Flipping Decoders for Post-Quantum Cryptography](https://ieeexplore.ieee.org/document/9180360) Performance speedup of five times using the Xilinx Artix-7 200 FPGA [[ZGF20]](../../refs#zgf20) -- Hardware Security Modules (HSMs): - - [Post-Quantum Secure Architectures for Automotive Hardware Secure Modules](https://eprint.iacr.org/2020/026.pdf) Building a post-quantum secure automotive HSM is feasible and can meet the hard requirements imposed by a modern vehicle ECU [[WaSt20]](../../refs#wast20) -- GPU Implementations: - - [Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units](https://www.mdpi.com/2227-7390/8/10/1781) Performance improvements using graphical proccesing units for LWE-based algorithms [[AnSe20]](../../refs#anse20) - -##### **Network Performacne** -- Measurements and benchmarks: - - [Benchmarking Post-Quantum Cryptography in TLS](https://eprint.iacr.org/2019/1447) Packet loss rates above 3–5% start to have a significantimpact on post-quantum algorithms that fragment across many packets [[PST19]](../../refs#pst19) - - [Real-world measurements of structured-lattices and supersingular isogenies in TLS](https://www.imperialviolet.org/2019/10/30/pqsivssl.html) Computational advantages of structured lattices make them a more attractive choice for post-quantum confidentiality [[Lang19]](../../refs#lang19) - - [Measuring TLS key exchange with post-quantum KEM](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/kwiatkowski-measuring-tls.pdf) [[KSL+19]](../../refs#ksl19) - - [Post-Quantum Authentication in TLS 1.3: A Performance Study](http://eprint.iacr.org/2020/071) Detailed performance evaluation of the NIST signature algorithm candidates and imposed latency on TLS 1.3 [[SKD20]](../../refs#skd20) -- TLS, DTLS, IKEv2 and QUIC PQC integrations: - - [The TLS Post-Quantum Experiment](https://blog.cloudflare.com/the-tls-post-quantum-experiment/) Evaluating the performance and feasibility of deployment in TLS of two post-quantum key agreement ciphers [[KwVa19]](../../refs#kwva19) - - [Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyberand SPHINCS+ with Mbed TLS](https://dl.acm.org/doi/abs/10.1145/3320269.3384725) Post-quantum key establishment with Kyber performs well in TLS on embedded devices compared to ECC variants [[BSKNS20]](../../refs#bskns20) - - [Post-Quantum Kryptographie für IPsec](https://svs.informatik.uni-hamburg.de/publications/2015/2015-02-24-Zimmer-DFN-PQC-fuer-IPsec.pdf) Integration of the Niederreiter scheme in IPsec IKEv2 handshake [[Zim15]](../../refs#zim15) - - [Towards a Verifiably Secure Quantum-Resistant Key Exchange in IKEv2](https://www.nm.ifi.lmu.de/pub/Diplomarbeiten/heid19/PDF-Version/heid19.pdf) PQC integration in IKEv2 as a new PQ-IKEv2 protocol [[Hei19]](../../refs#hei19) - - [The Viability of Post-quantum X.509 Certificates](https://eprint.iacr.org/2018/063) Signature schemes standardized in NIST PQ Project can work with X.509certs in a post-quantum Internet [[KPDG18]](../../refs#kpdg18) - - [Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project](https://link.springer.com/chapter/10.1007%2F978-3-319-69453-5_2) [[StMo16]](../../refs#stmo16) -- VPN evaluations: - - [Two PQ Signature Use-cases: Non-issues, challenges and potential solutions](https://eprint.iacr.org/2019/1276) Dilithium and Falcon are the best available options but come with an impact on TLS performance [[KaSi19]](../../refs#kasi19) - - [Towards Quantum-Safe VPNs and Internet](https://eprint.iacr.org/2019/1277.pdf): Evaluation of CPU overhead and security using OpenSSL and OpenVPN [[vHAA+19]](../../refs#vhaa19) - - [Post-quantum WireGuard](https://eprint.iacr.org/2020/379.pdf): PQ-WireGuard post-quantum variant of the handshake in the WireGuard VPN protocol [[HNS+20]](../../refs#hns20) diff --git a/content/docs/migration/process.md b/content/docs/migration/process.md deleted file mode 100644 index 987c8391a5e55a4fa2072ca3074e367542f326a1..0000000000000000000000000000000000000000 --- a/content/docs/migration/process.md +++ /dev/null @@ -1,23 +0,0 @@ ---- -title: "Algorithm Migration Process" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 5 ---- -- Hybrid TLS & SSH Implementation: - - [Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/stebila-prototyping-post-quantum.pdf): Hybrid approach: Two or more independent algorithms chosen from both post-quantum, and classical schemes [[CPS19]](../../refs#cps19) - - [Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte](https://arxiv.org/pdf/2102.00157v1): Field report on the integration of thePQC methods McEliece and SPHINCS+ based on the eUCRITE API [[ZWH21]](../../refs#zwh21) -- Hybrid Lattice-Based: - - [ImperialViolet - CECPQ1 results](https://www.imperialviolet.org/2016/11/28/cecpq1.html): Successful experiment using hybrid approach, no network problems and a median connection latency increase of one millisecond [[A.16]](../../refs#a.16) - - [Experimenting with Post-Quantum Cryptography](https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html): Same experiment, see above [[Bra16]](../../refs#bra16) - - [Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial m2m communication](http://link.springer.com/10.1007/978-3-030-59013-0_15): Tradeoffs in security: big key/certificate sizes results in problems and difficulties for various protocols.[[PS20]](../../refs#ps20) - - [Incorporating post-quantum cryptography in a microservice environment](https://homepages.staff.os3.nl/~delaat/rp/2019-2020/p13/report.pdf): Post-Quantum algorithms perform on a similar level to classical ones. The most feasible algorithms are lattice-based. [[WvdG20]](../../refs#wvdg20) -- Hybrid PQ CECPQ2(b) & X25519: - - [The TLS Post-Quantum Experiment](https://blog.cloudflare.com/the-tls-post-quantum-experiment/): Experiment between google and cloudflare comparing three groups using post-quantum CECPQ2, CECPQ2b or non-post-quantum X25519.[[KV19]](../../refs#kv19) -- Hybrid Certificates: - - [X.509-Compliant Hybrid Certificates for the Post-Quantum Transition](http://tubiblio.ulb.tu-darmstadt.de/115809/): Parallel usage of two independent cryptographic schemes within public key infrastructures enabling a stepwise transition to post-quantum secureand hybrid algorithms [[BBG+19]](../../refs#bbg19) -- Decentralized PKIs: - - [QChain: Quantum-resistant and Decentralized PKI using Blockchain](https://caislab.kaist.ac.kr/publication/paper_files/2018/SCIS'18_HC_BC.pdf): Quantum-resistant decentralized PKI system using blockchain [[AnKi18]](../../refs#anki18) -<!-- - PQC protocol integration: --> - <!-- - [Post-Quantum Kryptographie - Classic McEliece](/docs/migration/McEliece.pdf) Introducing a new ASN.1 PQ key format and an evaluation of PQ integration for several cryptographic protocols [[Meun21]](../../refs#meun21) --> diff --git a/content/docs/migration/protocols/_index.md b/content/docs/migration/protocols/_index.md deleted file mode 100644 index 3997c2f346143037e203ecd9507acd96217b7e05..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/_index.md +++ /dev/null @@ -1,60 +0,0 @@ ---- -title: "PQ Security Protocols" -date: 2021-05-05T22:41:49+02:00 -draft: false -weight: 2 -layout: no_index ---- -An overview of the standard security protocols and applications that make use of cryptographic systems and cipher suites, and their current state of PQC integration. - -|Protocol/Application|Description|Security Aspect|Mechanism|Usage|OSI-Layer| -|--------------------|-----------|---------------|---------|-----|---------| -|**Data Link Layer**| -|[MACsec]({{< ref "/macsec" >}} "MACsec")|Media Access Control Security|Confidentiality|Pre-Shared Keys|Ethernet|2| -|[CHAP]({{< ref "/pap" >}} "CHAP")|Challenge-Handshake Authentication Protocol|User Authentication|Hash, Challenge & Pre-Shared Secret|PPP (Point-to-Point)|2| -|[PAP]({{< ref "/pap" >}} "PAP")|Password Authentication Protocol|User Authentication|Username & Password|PPP (Point-to-Point)|2| -|**Network Layer**| -|[AH]({{< ref "/ipsec" >}} "AH")|Authentication Header|Data Authentication & Integrity|Hash & Pre-Shared Secret|IPsec|3-4| -|[ESP]({{< ref "/ipsec" >}} "ESP")|Encapsulating Security Payload|Data Authentication, Integrity & Confidentiality|Hash, Pre-Shared Secret & Encryption|IPsec|3-4| -|[IKEv2]({{< ref "/ipsec" >}} "IKEv2")|Internet Key Exchange|User Authentication and Confidentiality|Diffie-Hellman Key Agreement & X.509 Certificates|IPsec|3-4| -|**Transport Layer**| -|[TLS/SSL]({{< ref "/tls" >}} "TLS/SSL")|Transport Layer Security/Secure Sockets Layer|User Authentication & Confidentiality|Diffie-Hellman Key Agreement & X.509 Certificates|TCP|4-7| -|[DTLS]({{< ref "/dtls" >}} "DTLS")|Datagram Transport Layer Security|User Authentication & Confidentiality|Diffie-Hellman Key Agreement & X.509 Certificates|UDP|4| -|[SRTP/ZRTP]({{< ref "/rtp" >}} "SRTP/ZRTP")|(Secure) Real-Time Transport Protocol|Data Authentication, Integrity & Confidentiality|Diffie-Hellman and Hash Key Agreement, Encryption & MAC|RTP|4-7| -|**Application Layer**| -|[SSH]({{< ref "/ssh" >}} "SSH")|Secure Shell Protocol|User Authentication, Integrity & Confidentiality|Diffie-Hellman Key Agreement, X.509 Certificates, MAC, Password or Public Key Authentication & Encryption|-|7| -|[OpenVPN]({{< ref "/vpn" >}} "OpenVPN")|Open Virtual Private Network|User Authentication, Integrity, Confidentiality|Pre-Shared Keys, Diffie-Hellman Key Agreement (TLS), X.509 Certificates, Username & Password, MAC, Encryption|VPN|2-7| -|[WireGuard]({{< ref "/vpn" >}} "WireGuard")|WireGuard Virtual Private Network|Data Authentication, Integrity, Confidentiality|Diffie-Hellman Key Agreement, MAC & Encryption|VPN|2-7| -|[DNSSEC]({{< ref "/dnssec" >}} "DNSSEC")|Domain Name System Security Extensions|Data Authentication & Integrity|Digital Signatures & Certificates|IP|7| -|[S-MIME/PGP-MIME]({{< ref "/smime" >}} "S-MIME/PGP-MIME")|Secure Multipurpose Internet Mail Extension|Data Authentication, Integrity & Confidentiality|Hybrid Encryption & Digital Signatures|E-Mail|7| -|[PGP/GPG]({{< ref "/pgp" >}} "PGP/GPG")|Pretty Good Privacy/GNU Privacy Guard|Data Authentication, Integrity & Confidentiality|Hybrid Encryption & Digital Signatures|E-Mail|7| -|[Kerberos/PKINIT]({{< ref "/pkinit" >}} "Kerberos/PKINIT")|Authentication Service|User Authentication|Username, Password & Encryption|Network Communication|7| -|[SSO (OAuth/LDAP/SAML/RADIUS)]({{< ref "/sso" >}} "SSO (OAuth/LDAP/SAML/RADIUS)")|Single Sign-on|User Authentication|Depends on Used Protocol|Network Communication|7| -|[SFTP]({{< ref "/sftp" >}} "SFTP")|SSH File Transfer Protocol|User Authentication and Confidentiality|SSH & Encryption|File Transfer|7| ------------------------------------------------------------------------------------ - -##### [Certificates and Cryptographic Standards]({{< ref "/certs" >}} "Certificates and Cryptographic Standards") -- PKCS (Public Key Cryptography Standards) -- X.509 -- CMS (Cryptographic Message Syntax) - -##### [Blockchain]({{< ref "/dlt" >}} "Blockchain") -- DLTs (Distributed Ledgers) - -##### [Wireless Networks]({{< ref "/wlan" >}} "Wireless Networks") -- WPA/IEEE 802.x1/EAP -- UMTTS/LTE/5G -- Bluetooth/IR/ZigBee -- WSN - -##### [Others]({{< ref "/others" >}} "Others") -- OPC UA (Open Platform Communication Unified Architecture) -- L2TP (Layer 2 Tunneling Protocol) -- SSTP (Secure Socket Tunneling Protocol) -- GRE (Generic Routing Encapsulation) -- QUIC (Quick) -- S-RPC (Secure Remote Procedure Call) -- FinTS/HBCI -- PCT -- SET -- Telnet diff --git a/content/docs/migration/protocols/all/certs.md b/content/docs/migration/protocols/all/certs.md deleted file mode 100644 index 31b0550a4235acfdb35c781c71d02d635cdc54c2..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/certs.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "Certificates and Cryptographic Standards" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 15 ---- diff --git a/content/docs/migration/protocols/all/dlt.md b/content/docs/migration/protocols/all/dlt.md deleted file mode 100644 index 675e972de5c2b96e824e4875ae59ea947e864a4c..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/dlt.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "Distributed Ledger" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 16 ---- diff --git a/content/docs/migration/protocols/all/dnssec.md b/content/docs/migration/protocols/all/dnssec.md deleted file mode 100644 index 1984ebfb937407c9f13e4c95ad5dca0ea9e133c3..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/dnssec.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "DNSSEC" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 9 ---- -- [Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC](https://dl.acm.org/doi/10.1145/3431832.3431838): Evaluate three PQC-Algorithms that are suitable for DNSSEC within certain constraints [MdJvH+20](../../../../refs#mdjvh20) diff --git a/content/docs/migration/protocols/all/dtls.md b/content/docs/migration/protocols/all/dtls.md deleted file mode 100644 index c41aed1a81708b7708cd4f5237ff1795d9a2e06b..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/dtls.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "DTLS" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 5 ---- diff --git a/content/docs/migration/protocols/all/ipsec.md b/content/docs/migration/protocols/all/ipsec.md deleted file mode 100644 index af034343ac7e75ab65353fe7da7f0b2498afcecc..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/ipsec.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "IPsec/IKE" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 3 ---- diff --git a/content/docs/migration/protocols/all/macsec.md b/content/docs/migration/protocols/all/macsec.md deleted file mode 100644 index e2e6a1d949fd931484aa869a283d26ead577ee0d..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/macsec.md +++ /dev/null @@ -1,8 +0,0 @@ ---- -title: "MACsec" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 1 ---- -- [Post-quantum MACsec in Ethernet Networks ](https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5973) Authenticated post-quantum key establishment protocol which is suitable for long-term secure MACsec. Hybrid mode, ephemeral key exchange, and an end-to-end encryption [[ChSe21]](../../../../refs#chse21). diff --git a/content/docs/migration/protocols/all/others.md b/content/docs/migration/protocols/all/others.md deleted file mode 100644 index 4d9f8db033f4e266708b5cc3020d34eed5a05bc0..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/others.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "Others" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 18 ---- diff --git a/content/docs/migration/protocols/all/pap.md b/content/docs/migration/protocols/all/pap.md deleted file mode 100644 index a3ebade581baabab8692a79c89e2ee9e22c9cd69..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/pap.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "CHAP/PAP" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 2 ---- diff --git a/content/docs/migration/protocols/all/pgp.md b/content/docs/migration/protocols/all/pgp.md deleted file mode 100644 index 03f7b01fbaba205395ea9fb522c627e725c38c1d..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/pgp.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "PGP/GPG" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 11 ---- diff --git a/content/docs/migration/protocols/all/pkinit.md b/content/docs/migration/protocols/all/pkinit.md deleted file mode 100644 index ddcd46f832ec5354e4832006ff0f396d8f87e301..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/pkinit.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "Kerberos" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 12 ---- diff --git a/content/docs/migration/protocols/all/rtp.md b/content/docs/migration/protocols/all/rtp.md deleted file mode 100644 index 2ed460bdbec83bf35d9dfff5be2aeb44ae0020f2..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/rtp.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "SRTP/ZRTP" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 6 ---- diff --git a/content/docs/migration/protocols/all/sftp.md b/content/docs/migration/protocols/all/sftp.md deleted file mode 100644 index 0db72368c1ab7d761ae3a31f5f7c15eec7364d05..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/sftp.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "SFTP" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 14 ---- diff --git a/content/docs/migration/protocols/all/smime.md b/content/docs/migration/protocols/all/smime.md deleted file mode 100644 index 71022aa9217181c9b72aa00ecc1ef4c724e9859e..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/smime.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "S/MIME" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 10 ---- diff --git a/content/docs/migration/protocols/all/ssh.md b/content/docs/migration/protocols/all/ssh.md deleted file mode 100644 index bb1ee3bcec20b61c8459266b695211cc08b62acd..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/ssh.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "SSH" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 7 ---- diff --git a/content/docs/migration/protocols/all/sso.md b/content/docs/migration/protocols/all/sso.md deleted file mode 100644 index 094a68a117a540e532e3f98372aedb936206c7b8..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/sso.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "Single Sign-On" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 13 ---- diff --git a/content/docs/migration/protocols/all/tls.md b/content/docs/migration/protocols/all/tls.md deleted file mode 100644 index ba4e2605d7132f7a2e49b15c8a36a574031ef1af..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/tls.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "TLS/SSL" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 4 ---- diff --git a/content/docs/migration/protocols/all/vpn.md b/content/docs/migration/protocols/all/vpn.md deleted file mode 100644 index 30b7ccdf93623c061157c7982c2e947395378405..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/vpn.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "VPN" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 8 ---- diff --git a/content/docs/migration/protocols/all/wlan.md b/content/docs/migration/protocols/all/wlan.md deleted file mode 100644 index a7c184e7500a5529f040144290221d772476bd89..0000000000000000000000000000000000000000 --- a/content/docs/migration/protocols/all/wlan.md +++ /dev/null @@ -1,7 +0,0 @@ ---- -title: "Wireless Networks" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 17 ---- diff --git a/content/docs/migration/security.md b/content/docs/migration/security.md deleted file mode 100644 index 1fdc01d177e2e6b3722839aa1622a00ae2c1234b..0000000000000000000000000000000000000000 --- a/content/docs/migration/security.md +++ /dev/null @@ -1,39 +0,0 @@ ---- -title: "Security Considerations" -date: 2021-05-05T22:41:49+02:00 -draft: false -type: docs -weight: 4 ---- -##### **Algorithm, Parameter Selection and Tradeoffs** -- Key/sig. size tradeoffs: - - [The Viability of Post-quantum X.509 Certificates](https://eprint.iacr.org/2018/063.pdf): Present suitable parameters for software signature use cases and good signature candidates for TLS 1.3 authentication. [[KPDG18]](../../refs#kpdg18) - - [Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial m2m communication](http://link.springer.com/10.1007/978-3-030-59013-0_15): Tradeoffs in security: big key/certificate sizes results in problems and difficulties for various protocols.[[PS20]](../../refs#ps20) - - [A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography](https://ieeexplore.ieee.org/document/9153901) Complexity analysis on isogeny-based, code-based and lattice-baced PQC schemes [[BRP20]](../../refs#brp20) - -##### **Cryptanalysis** -- Formal verification: - - [Post-Quantum Verification of Fujisaki-Okamoto](https://link.springer.com/chapter/10.1007/978-3-030-64837-4_11) Computer-verified formalization of the post-quantum security proof of the Fujisaki-Okamoto transform [[Unr20]](../../refs#unr20) -- Anonymity: - - [NTRU leads to Anonymous, Robust Public-Key Encryption](https://eprint.iacr.org/2021/741.pdf) Solution to the open problem of the anonymity and robustness of NTRU [[Xag21]](../../refs#xag21) - - [Anonymous, Robust Post-Quantum Public Key Encryption](https://eprint.iacr.org/2021/708.pdf) Study of the anonymity and robustness of NIST finalists Classic McEliece, Kyber, NTRU and Saber [[GMP21]](../../refs#gmp21) -- PQC schemes broken by cryptanalysis: - - [Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme](https://eprint.iacr.org/2019/1490.pdf): A new type of attack called Subfield Differential Attack (SDA) on Lifted Unbalanced Oil and Vinegar (LUOV) [[DDS+20]](../../refs#dds20) - - [Quantum cryptanalysis on some generalized Feistel schemes](https://eprint.iacr.org/2017/1249.pdf): Quantum distinguishers to introduce generic quantum key-recovery attacks [[DLW19]](../../refs#dlw19) - - [A reaction attack against cryptosystems based on LRPC codes.](https://eprint.iacr.org/2019/845.pdf): Analyze cryptosystems based on Low-Rank Parity-Check (LRPC) codes. [[SSPB19]](../../refs#sspb19) - - [On Quantum Chosen-Ciphertext Attacks and Learning with Errors](https://www.mdpi.com/2410-387X/4/1/10) Chosen cipher-text attack using a new variant of the Bernstein–Vazirani algorithm on LWE algorithms [[AJO+20]](../../refs#ajo20) -- New security assessment methods: - - [Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE.](https://eprint.iacr.org/2019/103.pdf): New models of computation which allow a direct comparison between classical and quantum algorithms [[JS19]](../../refs#js19) - - [A classification of differential invariants for multivariate post-quantum cryptosystems](http://link.springer.com/10.1007/978-3-642-38616-9_11): Present an extension of a recent measure of security against a differential adversary. The technique assures security against any first-order differential invariant adversary. [[PST13]](../../refs#pst13) -- Code-based PQC algorithms for PRNG: - - [Testing of Code-Based Pseudorandom Number Generators for Post-Quantum Application](https://www.researchgate.net/publication/342456148_Testing_of_Code-Based_Pseudorandom_Number_Generators_for_Post-Quantum_Application): Code-based pseudorandom generator, improvement of Fischer-Stern generator [[KKS+20]](../../refs#kks20) - -##### **Side-Channel Attacks** -- Side-Channel Attacks: - - [Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions](https://arxiv.org/abs/2005.04344): Overview of several PQC-related side-channel attacks[[CCA+21]](../../refs#cca21) -- Minimizing attack vectors: - - [Physical protection of lattice-based cryptography: Challenges and solutions](https://pure.qub.ac.uk/files/156772945/paper.pdf): Attack and countermeasure for gaussian sampler of lattice-based schemes. [[KOV+18]](../../refs#kov18) - - [A side-channel resistant implementation of saber](https://eprint.iacr.org/2020/733.pdf): State of the art in terms of side channel attacks against lattice based cryptosystems and their respective countermeasures. [[VBDK+20]](../../refs#vbdk20) - - [Side-Channel Analysis and Countermeasure Design on ARM-based Quantum-Resistant SIKE](https://ieeexplore.ieee.org/document/9181442): Side-Channel resistant implementation of saber, using masking as a countermeasure [[ZYD20]](../../refs#zyd20) -- Successful attack on Himq-3: - - [A complete cryptanalysis of the post-quantum multivariate signature scheme himq-3](https://link.springer.com/chapter/10.1007%2F978-3-030-61078-4_24): Singularity Attack: Successfully breaks signatures of the multivarite public key scheme Himq-3 [[DDW20]](../../refs#ddw20) diff --git a/content/docs/migration/standards.md b/content/docs/migration/standards.md deleted file mode 100644 index 73c98ddd6ca044a28590d71618a0d407335347da..0000000000000000000000000000000000000000 --- a/content/docs/migration/standards.md +++ /dev/null @@ -1,30 +0,0 @@ ---- -title: "New Standards" -date: 2021-05-06T00:11:20+02:00 -draft: false -type: docs -weight: 7 ---- -- NIST Report on Round 3 Finalists: - - [Status report on the second round of the NIST post-quantum cryptography standardization process](https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf): Third round finalists for public-key encryption / key-establishment algorithms and digital signatures [[MAA+20]](../../refs#maa20) -- Review of NIST Candidates: - - [Standardisierung von post-quanten-kryptografie und empfehlungen des bsi](https://www.bsi.bund.de/DE/Service-Navi/Veranstaltungen/Deutscher-IT-Sicherheitskongress-30-Jahre-BSI/deutscher-it-sicherheitskongress-30-jahre-bsi_node.html): Overview of the current state of standardization of post Quantum cryptography with respect to the BSI recommendations. [[HKW21]](../../refs#hkw21) -- Open Quantum Project: - - [Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project](https://eprint.iacr.org/2016/1017.pdf): Open Quantum Project, libqos library: exemplary cryptographic applications like OpenSSL. Comparing NIST Round 2 PQC candidate implementations using OpenSSL [[SM16]](../../refs#sm16) -- TLS PQC Drafts: - - [Hybrid key exchange in TLS 1.3](https://datatracker.ietf.org/doc/html/draft-ietf-tls-hybrid-design): Construction for hybrid key exchange in TLS protocol version 1.3 [[SFG20]](../../refs#sfg20) - - [Quantum-Safe Hybrid (QSH) Key Exchange for Transport Layer Security (TLS) version 1.3](https://datatracker.ietf.org/doc/html/draft-whyte-qsh-tls13-06): Mechanism for providing modular design for quantum-safe cryptography in the handshake for TLS protocol version 1.3 [[Wh+17]](../../refs#wh17) - - [Hybrid key exchange in TLS 1.2](https://datatracker.ietf.org/doc/html/draft-campagna-tls-bike-sike-hybrid-06): Hybrid key exchange schemes for TLS protocol version 1.2 [[CaCr21]](../../refs#cacr21) - - [Quantum-Safe Hybrid (QSH) Ciphersuite for Transport Layer Security (TLS) version 1.2](https://datatracker.ietf.org/doc/html/draft-whyte-qsh-tls12-02): New cipher suite providing modular design for quantum-safe cryptography in the handshake for TLS protocol version 1.2 [[SWZ16]](../../refs#swz16) - - [Hybrid ECDHE-SIDH Key Exchange for TLS](https://datatracker.ietf.org/doc/html/draft-kiefer-tls-ecdhe-sidh-00): TLS key exchange combining Supersingular elliptic curve isogenie diffie-hellman (SIDH), with elliptic curve Diffie-Hellman (ECDHE) key exchange [[KiKw18]](../../refs#kikw18) - - [A Transport Layer Security (TLS) Extension for Establishing an Additional Shared Secret](https://datatracker.ietf.org/doc/html/draft-schanck-tls-additional-keyshare-00): TLS extension to establish an additional shared secret using a second key exchange algorithm [[ScSt17]](../../refs#scst17) -- SSH PQC Drafts: - - [Post-quantum public key algorithms for the Secure Shell (SSH) protocol](https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-pq-ssh-00) Hybrid key exchange in the SSH Transport Layer Protocol using ECDH and PQC signature schemes [[Kam+20]](../../refs#kam20) -- IKEv2 PQC Drafts: - - [Mixing Preshared Keys in IKEv2 for Post-quantum Security](https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-qr-ikev2-11): Extension of IKEv2 to allow it to be resistant to a quantum computer by using pre-shared keys [[FMK19]](../../refs#fmk19) -- DNSSEC PQC Drafts: - - [Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC](https://dl.acm.org/doi/10.1145/3431832.3431838): Evaluate three PQC-Algorithms that are suitable for DNSSEC within certain constraints [[MdJvH+20]](../../refs#mdjvh20) -- Decentralized Cert. Management: - - [Next-generation web public-key infrastructure technologies](https://eprints.qut.edu.au/128643): New decentralized approach to certificate management based on generic blockchains (DPKIT), compatible with existing PKIs. [[HM19]](../../refs#hm19) -- Draft for Composite Keys and Signatures: - - [Composite Keys and Signatures For Use In Internet PKI](https://tools.ietf.org/id/draft-ounsworth-pq-composite-sigs-01.html) This document defines the structures CompositePublicKey, CompositeSignatureValue, and CompositeParams, which are sequences of the respective structure for each component algorithm. [[OP20]](../../refs#op20) diff --git a/content/docs/projects.md b/content/docs/projects.md deleted file mode 100644 index 094b9bdc015d9f3d1beb1b624d49071ec824d0d9..0000000000000000000000000000000000000000 --- a/content/docs/projects.md +++ /dev/null @@ -1,27 +0,0 @@ ---- -title: "Projects and Initiatives" -linktitle: "Projects and Initiatives" -date: 2021-05-06T00:12:55+02:00 -draft: false -type: docs -weight: 6 -menu: - main: - weight: 2 ---- -- [NCCoE](https://www.nccoe.nist.gov/projects/building-blocks/post-quantum-cryptography): -NCCoE project Migration to Post-Quantum Cryptography. - -- [Open Quantum Safe](https://openquantumsafe.org/): -An open-source project that aims to support the development and prototyping of quantum-resistant cryptography. - -- [Quantum RISC](https://www.quantumrisc.de/): -Next Generation Cryptography for Embedded Systems. - -- [Eclipse CogniCrypt]( https://www.eclipse.org/cognicrypt/): -Secure Integration of Cryptographic Software. - -- [BSI-Project: Secure Implementation of a Universal Crypto Library](https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/Kryptografie/Kryptobibliothek-Botan/kryptobibliothek-botan_node.html) More information (in German language) can be found in the [project summary](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Krypto/Projektzusammenfassung_Botan.pdf) - -- [PQC Integration](https://cspub.h-da.io/pqc/): -PQC integration projects initiated by the research groups for Applied Cyber-Security and User-Centered Security at Darmstadt University of Applied Sciences. diff --git a/content/docs/refs.md b/content/docs/refs.md deleted file mode 100644 index 7ce17bf3e0b8af5de06b67b9b1d5d75e2049b6db..0000000000000000000000000000000000000000 --- a/content/docs/refs.md +++ /dev/null @@ -1,403 +0,0 @@ ---- -title: "References" -linktitle: "References" -date: 2021-05-06T00:13:12+02:00 -draft: false -type: docs -weight: 8 ---- -###### [A.16] -[A. Langley. ImperialViolet - CECPQ1 results, 2016.](https://www.imperialviolet.org/2016/11/28/cecpq1.html) - -###### [AASA+19] -[G. Alagic, J. Alperin-Sheriff, D. Apon, D. Cooper, Q. Dang, Y. Liu, C. Miller, D.Moody, R. Peralta, et al.2019.Status report on the first round of the NIST post-quantum cryptography standardization process. US Department of Commerce,National Institute of Standards and Technology](https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8240.pdf) - -###### [ABB+20] -[E. Alkim, P. S. L. M. Barreto, N. Bindel, J. Krämer, P. Longa, and J. E. Ricardini. The lattice-based digital signature scheme qtesla. In M. Conti, J. Zhou, E. Casalicchio, and A. Spognardi, editors, Applied Cryptography and Network Security, pages 441–460. Springer International Publishing, 2020](https://eprint.iacr.org/2019/085.pdf) - -###### [ABB+20] -[N. Aragon, P. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, S. Gueron, T. Guneysu, C. A. Melchor, et al.2020. BIKE: bit flipping key encapsulation (22 Oct 2020)](https://bikesuite.org/files/v4.1/BIKE_Spec.2020.10.22.1.pdf) - -###### [ABBC10] -[T. Acar, M. Belenkiy, M. Bellare, and D. Cash. Cryptographic agility and its relation to circular encryption. 2010.](https://eprint.iacr.org/2010/117) - -###### [ABD+21] -[R. Avanzi, J. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J. M. Schanck,P. Schwabe, G. Seiler, and D. Stehlé. 2021. CRYSTALS-Kyber algorithm specifi-cations and supporting documentation (version 3.01).NIST PQC Round 3(31Jan 2021)](https://pq-crystals.org/kyber/data/kyber-specification-round3-20210131.pdf) - -###### [ABF+17] -[Y. Acar, M. Backes, S. Fahl, S. Garfinkel, D. Kim, M. L. Mazurek, and C. Stransky. Comparing the Usability of Cryptographic APIs. In 2017 IEEE Symposium on Security and Privacy (SP), pages 154–171, San Jose, CA, USA, May 2017. IEEE, doi:10.1109/SP.2017.52](http://ieeexplore.ieee.org/document/7958576/) - -###### [ADPS16] -[E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe. Post-quantum key exchange—a new hope. In 25Th {USENIX } security symposium ( {USENIX } security 16), pages 327–343, 2016](https://eprint.iacr.org/2015/1092.pdf) - -###### [AEK+21] -[Azarderakhsh, R., El Khatib, R., Koziel, B., & Langenberg, B. (2021). Hardware Deployment of Hybrid PQC. IACR Cryptol. ePrint Arch., 2021, 541.](https://eprint.iacr.org/2021/541.pdf) - -###### [AJO+20] -[Alagic G, Jeffery S, Ozols M, Poremba A. On Quantum Chosen-Ciphertext Attacks and Learning with Errors. Cryptography. 2020; 4(1):10. https://doi.org/10.3390/cryptography4010010](https://www.mdpi.com/2410-387X/4/1/10) - -###### [AnKi18] -[An, H., & Kim, K. (2018, January). QChain: Quantum-resistant and decentralized PKI using blockchain. In Proc. SCIS (pp. 1-8).](https://caislab.kaist.ac.kr/publication/paper_files/2018/SCIS'18_HC_BC.pdf) - -###### [AnSe20] -[An, SangWoo, and Seog Chung Seo. "Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units." Mathematics 8.10 (2020): 1781.](https://www.mdpi.com/2227-7390/8/10/1781) - -###### [AVVY19] -[F. Armknecht, I. Verbauwhede, M. Volkamer, and M. Yung, editors. Biggest Failures in Security, volume 9 of Dagstuhl Reports. Dagstuhl Publishing, Nov. 2019.](https://drops.dagstuhl.de/opus/volltexte/2020/11981/) - -###### [AZCH19] -[L. Hornquist Astrand, L. Zhu, M. Cullen, and G. Hudson. Public key cryptography for initial authentication in kerberos (PKINIT) algorithm agility. 2019. RFC 8636.](https://tools.ietf.org/html/rfc8636.html) - -###### [BBC+20] -[D. Bernstein, B. Brumley, M. Chen, C. Chuengsatiansup, T. Lange, A. Marotzke, N. Tuveri, C. van Vredendaal, and B. Yang. Ntru prime: round 3 20201007. 2020](https://ntruprime.cr.yp.to/nist/ntruprime-20201007.pdf) - -###### [BBC+21] -[G. Banegas, D. J. Bernstein, F. Campos, T. Chou, T. Lange, M. Meyer, B. Smith and J. Sotáková. CTIDH: faster constant-time CSIDH. 2021. Cryptology ePrint Archive, Report 2021/633](https://eprint.iacr.org/2021/633) - -###### [BBG+19] -[Bindel, N., Braun, J., Gladiator, L., Stöckert, T., & Wirth, J. (2019). X. 509-compliant hybrid certificates for the post-quantum transition. Journal of Open Source Software, 4(40), 1606](https://joss.theoj.org/papers/10.21105/joss.01606) - -###### [BHK+19] -[D. J. Bernstein, A. Hülsing, S. Kölbl, R. Niederhagen, J. Rijneveld, and P. Schwabe. The sphincs+ signature framework. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS ’19, page 2129–2146, New York, NY, USA, 2019. Association for Computing Machinery. doi:10.1145/3319535.3363229](https://eprint.iacr.org/2019/1086.pdf) - -###### [BKS19] -[L. Botros, M. J. Kannwischer, and P. Schwabe. Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4. In J. Buchmann and T. Nitaj, A.and Rachidi, editors, Progress in Cryptology – AFRICACRYPT 2019, volume 11627, pages 209–228. Springer International Publishing, Cham, 2019. Series Title: Lecture Notes in Computer Science. doi:10.1007/978-3-030-23696-0_11](http://link.springer.com/10.1007/978-3-030-23696-0_11) - -###### [BPS21] -[Barker, W., Polk, W., & Souppaya, M. (2021). Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms (pp. 10-10). National Institute of Standards and Technology](https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf) - -###### [Bra16] -[M. Braithwaite. Experimenting with post-quantum cryptography, 2016.](https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html) - -###### [BRP20] -[F. Borges, P. R. Reis and D. Pereira, "A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography," in IEEE Access, vol. 8, pp. 142413-142422, 2020, doi: 10.1109/ACCESS.2020.3013250.](https://ieeexplore.ieee.org/document/9153901) - -###### [BSI20] -[BSI. 2020. Migration zu Post-Quanten-Kryptografie.](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Krypto/Post-Quanten-Kryptografie.html) - -###### [BSKNS20] -[K. Bürstinghaus-Steinbach, C. Krauß, R. Niederhagen, and M. Schneider. 2020.Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyberand SPHINCS+ with Mbed TLS. InProceedings of the 15th ACM Asia Conferenceon Computer and Communications Security (ASIA CCS ’20). Association forComputing Machinery, 841–852](https://dl.acm.org/doi/abs/10.1145/3320269.3384725) - -###### [BSNK19] -[K. Basu, D. Soni, M. Nabeel, and R. Karri. 2019. NIST Post-Quantum Cryptography - A Hardware Evaluation Study](https://eprint.iacr.org/2019/047) - -###### [CaCr21] -[Campagna, M., & Crockett, E. (2019). Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS). Internet Engineering Task Force, Internet-Draft draft-campagna-tls-bike-sike-hybrid, 6](https://datatracker.ietf.org/doc/html/draft-campagna-tls-bike-sike-hybrid-06) - -###### [Cam19] -[Campbell Sr, R. (2019). Evaluation of post-quantum distributed ledger cryptography. The Journal of The British Blockchain Association, 2(1), 7679.](https://jbba.scholasticahq.com/article/7679.pdf) - -###### [CCA+21] -[S. Chowdhury, A. Covic, R. Y. Acharya, S. Dupee, and D. Ganji, F.and Forte. Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physi- cally unclonable functions. Journal of Cryptographic Engineering, February 2021.](https://arxiv.org/abs/2005.04344) - -###### [CCD+15] -[M. Campagna, L. Chen, O. Dagdelen, J. Ding, J Fernick, N. Gisin, D. Hayford, T. Jennewein, N. Lütkenhaus, and M. Mosca. 2015.Quantum SafeCryptography and Security: An introduction, benefits, enablers and chal-lenges.European Telecommunications Standards InstituteETSI White Paper,8 (June 2015), 1–64.](https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf) - -###### [CCH+20] -[M. Campagna, C. Costello, B. Hess, A. Jalali, B. Koziel, B. LaMacchia, P. Longa, M. Naehrig, J. Renes, D. Urbanik, et al. Supersingular isogeny key encapsulation. 2020](https://sike.org/files/SIDH-spec.pdf) - -###### [CCU+20] -[T. Chou, C. Cid, S. UiB, J. Gilcher, T. Lange, V. Maram, R. Misoczki, R. Niederhagen, K. G Paterson, Edoardo P., et al. Classic mceliece: conservative code-based cryptography 10 october 2020. 2020](https://classic.mceliece.org/nist/mceliece-20201010.pdf) - -###### [CDG+17] -[Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., ... & Zaverucha, G. (2017, October). Post-quantum zero-knowledge and signatures from symmetric-key primitives. In Proceedings of the 2017 acm sigsac conference on computer and communications security (pp. 1825-1842)](https://eprint.iacr.org/2017/279.pdf) - -###### [CDH+19] -[C. Chen, O. Danba, J. Hoffstein, A. Hülsing, J. Rijneveld, J. M Schanck, P. Schwabe, W. Whyte, and Z. Zhang. Ntru algorithm specifications and supporting documentation. Round-3 submission to the NIST PQC project, March 2019](https://ntru.org/f/ntru-20190330.pdf) - -###### [CDF+21] -[Cremers, C., Düzlü, S., Fiedler, R., Fischlin, M., & Janson, C. (2021). BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. In Proceedings of the 42nd IEEE Symposium on Security and Privacy (S&P'21). IEEE Press.](https://publications.cispa.saarland/3417/) - -###### [ChCh21] -[Chen, Ming-Shing, and Tung Chou. "Classic McEliece on the ARM Cortex-M4." IACR Cryptol. ePrint Arch. 2021 (2021): 492.](https://eprint.iacr.org/2021/492.pdf) - -###### [ChSe21] -[Cho, J. Y., & Sergeev, A. (2021). Post-quantum MACsec in Ethernet Networks. Journal of Cyber Security and Mobility, 161-176.](https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5973) - -###### [CFP+19] -[Casanova, J. C. Faugere, G. M. R. J. Patarin, L. Perret, and J. Ryckeghem.2019. GeMSS: a great multivariate short signature.Submission to NIST PQCcompetition Round-2(2019)](https://www-polsys.lip6.fr/Links/NIST/GeMSS_specification.pdf) - -###### [CJL+16] -[L. Chen, S. Jordan, Y. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone.2016.Report on post-quantum cryptography. Vol. 12. US Department of Com-merce, National Institute of Standards and Technology](https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf) - -###### [CMC19] -[Clancy, T. C., McGwier, R. W., & Chen, L. (2019, May). Post-quantum cryptography and 5G security: tutorial. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (pp. 285-285).](https://dl.acm.org/doi/abs/10.1145/3317549.3324882?casa_token=_HA-JzKBo2wAAAAA:ulj89qh94VJPx57x5Nm4QekITn3LORo9o76BX27-MV7wfrCkdx3LF1mUn54Byqa20EkQSH9dBDk93Q) - -###### [CPS19] -[E. Crockett, C. Paquin, and D. Stebila. Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. 2019.](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/stebila-prototyping-post-quantum.pdf) - -###### [CU16] -[L. Chen and R. Urian. Algorithm agility – discussion on TPM 2.0 ECC functionalities. In L. Chen, D. McGrew, and C. Mitchell, editors, Security Standardisation Research, volume 10074, pages 141–159. Springer Inter-national Publishing, 2016](http://link.springer.com/10.1007/978-3-319-49100-4_6.) - -###### [DDS+20] -[J. Ding, J. Deaton, K. Schmidt, Vishakha, and Z. Zhang. Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme. In D. Micciancio and T. Ristenpart, editors, Advances in Cryptology – CRYPTO 2020, pages 279–298, Cham, 2020. Springer International Publishing.](https://eprint.iacr.org/2019/1490.pdf) - -###### [DDW20] -[Z. Ding, J.and Zhang, J. Deaton, and L. Wang. A complete crypt- analysis of the post-quantum multivariate signature scheme himq- 3. In International Conference on Information and Communica- tions Security, pages 422–440. Springer, 2020.](https://link.springer.com/chapter/10.1007%2F978-3-030-61078-4_24) - -###### [DFA+20] -[V. Ba Dang, F. Farahmand, M. Andrzejczak, K. Mohajerani, D. T. Nguyen, andK. Gaj. 2020. Implementation and benchmarking of round 2 candidates in the nist post-quantum cryptography standardization process using hardware andsoftware/hardware co-design approaches.Cryptology ePrint Archive: Report2020/795(2020)](https://cryptography.gmu.edu/athena/PQC/GMU_PQC_2020_SW_HW.pdf) - -###### [DHP20] -[B. Dowling, T. Brandt Hansen, and K. G. Paterson. Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. In PQCrypto 2020, 2020.](https://eprint.iacr.org/2020/099.pdf) - -###### [DKL+21] -[L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D.Stehlé. 2021. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation.Round-3 submission to the NIST PQC project(8 Feb 2021)](https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf) - -###### [DKR+19] -[J. D’Anvers, A. Karmakar, S. Roy, F. Vercauteren, J. Mera, A. Bass, and M. Beirendonck. Saber: Mod-lwr based kem: Round 3 submission. In NIST Post-Quantum Cryptography Standardization: Round 3, 2019](https://www.esat.kuleuven.be/cosic/pqcrypto/saber/files/saberspecround3.pdf) - -###### [DLW19] -[X. Dong, Z. Li, and X. Wang. Quantum cryptanalysis on some generalized Feistel schemes. Science China Information Sciences, 62(2):22501, February 2019.](https://eprint.iacr.org/2017/1249.pdf) - -###### [DS05] -[J. Ding and D. Schmidt. Rainbow, a new multivariable polynomial signature scheme. In International Conference on Applied Cryptography and Network Security, pages 164–175. Springer, 2005](https://link.springer.com/chapter/10.1007/11496137_12) - -###### [FC20] -[Tiago M. Fernández-C. 2020. From Pre-Quantum to Post-Quantum IoT Security:A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.IEEEInternet of Things Journal7, 7 (2020), 6457–6480](https://ieeexplore.ieee.org/document/8932459) - -###### [FHK+20] -[P. A. Fouque, J. Hoffstein, P. Kirchner, V. Lyubashevsky, T. Pornin, T. Prest, T.Ricosset, G. Seiler, W. Whyte, and Z. Zhang. 2020. Falcon: Fast-fourier lattice-based compact signatures over NTRU specifications v1. 2.NIST Post-Quantum Cryptography Standardization Round3 (2020)](https://falcon-sign.info/falcon.pdf) - -###### [FMK19] -[Fluhrer, S., McGrew, D., Kampanakis, P., & Smyslov, V. (2019). Postquantum preshared keys for IKEv2. Internet Engineering Task Force, Internet-Draft draft-ietf-ipsecme-qr-ikev2-11.](https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-qr-ikev2-11) - -###### [GHK+21] -[Gonzalez, Ruben, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, and Bo-Yin Yang. "Verifying Post-Quantum Signatures in 8 kB of RAM." (2021).](https://kannwischer.eu/papers/2021_streamingpqc.pdf) - -###### [GKT13] -[R. Gagliano, S. Kent, and S. Turner. Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI). Request for Comments. 2013. RFC 6916.](https://tools.ietf.org/html/rfc6916) - -###### [GMP21] -[Grubbs, Paul, Varun Maram, and Kenneth G. Paterson. Anonymous, Robust Post-Quantum Public Key Encryption. Cryptology ePrint Archive, Report 2021/708, 2021. h ps://eprint. iacr. org/2021/708. 1, 5, 7, 13, 14, 2021.](https://eprint.iacr.org/2021/708.pdf) - -###### [GoKa15] -[Ghosh, S., & Kate, A. (2015, June). Post-quantum forward-secure onion routing. In International Conference on Applied Cryptography and Network Security (pp. 263-286). Springer, Cham](https://ieeexplore.ieee.org/abstract/document/9363165) - -###### [Hei19] -[Exchange, Quantum-Resistant Key. "Towards a Verifiably Secure Quantum-Resistant Key Exchange in IKEv2."](https://www.nm.ifi.lmu.de/pub/Diplomarbeiten/heid19/PDF-Version/heid19.pdf) - -###### [HKW21] -[H . Hagemeier, S. Kousidis, and T. Wunderer. Standardisierung von post-quanten-kryptografie und empfehlungen des bsi. In German Federal Office for Information Security (BSI), editor, Tagungsband zum 17. Deutschen IT-Sicherheitskongress, page 382–294. SecuMedia Verlag, Ingelheim, Germany, Feb 2021. Note: No direct link available!] - -###### [HLL+21] -[T. Hemmert, M. Lochter, D. Loebenberger, M. Margraf, S. Reinhardt, and G.Sigl. 2021. Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen. InTagungsband zum 17. Deutschen IT-Sicherheitskongress, German Federal Office for Information Security (BSI) (Ed.). SecuMedia Verlag,Ingelheim, Germany, 367–380](https://www.secumedia-shop.net/Deutschland-Digital-Sicher-30-Jahre-BSI) - -###### [HM19] -[S. Udyani H. Mudiyanselage. Next-generation web public-key infrastructure technologies, 2019. doi:10.5204/thesis.eprints.128643.](https://eprints.qut.edu.au/128643) - -###### [Hou15] -[R. Housley. Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms. RFC 7696, 2015.](https://tools.ietf.org/html/rfc7696) - -###### [HPA21] -[Howe, J., Prest, T., & Apon, D. (2021). SoK: How (not) to Design and Implement Post-Quantum Cryptography. IACR Cryptol. ePrint Arch., 2021, 462.](https://eprint.iacr.org/2021/462.pdf) - -###### [HPDM20] -[A. Holcomb, G. C. C. F. Pereira, B. Das, and M. Mosca. PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks. arXiv:2010.06571](https://arxiv.org/abs/2010.06571) - -###### [HNS+20] -[Hülsing, A., Ning, K. C., Schwabe, P., Weber, F., & Zimmermann, R. (2020). Post-quantum WireGuard. IACR Cryptol. ePrint Arch., 2020, 379.](https://eprint.iacr.org/2020/379.pdf) - -###### [HZHW20] -[R. Huesmann, A. Zeier, A. Heinemann, and A. Wiesmaier. Zur Benutzbarkeit und Verwendung von API-Dokumentationen. In Christian Hansen, Andreas Nürnberger, and Bernhard Preim, editors, Mensch und Computer 2020 - Workshopband, Bonn, 2020. Gesellschaft für Informatik e.V. doi:10.18420/muc2020-ws119-002.](https://dl.gi.de/handle/20.500.12116/33515) - -###### [JS19] -[S. Jaques and J. M. Schanck. Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE. In A. Boldyreva and D. Micciancio, editors, Advances in Cryptology – CRYPTO 2019, volume 11692, pages 32–61. Springer International Publish- ing, 2019.](https://eprint.iacr.org/2019/103.pdf) - -###### [KAMJ17] -[B. Koziel, R. Azarderakhsh, M. Mozaffari Kermani, and D. Jao. 2017. Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves.IEEETransactions on Circuits and Systems I: Regular Papers64, 1 (Jan. 2017), 86–99](https://ieeexplore.ieee.org/abstract/document/7725935) - -###### [Kam+20] -[Panos Kampanakis and Douglas Steblia and Markus Friedl and Torben Hansen and Dimitrios Sikeridis. 2020. Post-quantum public key algorithms for the Secure Shell (SSH) protocol, 0 Internet-Draft. Internet Engineering Task Force](https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-pq-ssh-00) - -###### [KaSi19] -[P. Kampanakis and D. Sikeridis. 2019.Two PQ Signature Use-cases: Non-issues, challenges and potential solutions. Technical Report 1276](https://eprint.iacr.org/2019/1276) - -###### [KGC+20] -[V. B. Y. Kumar, N. Gupta, A. Chattopadhyay, M. Kasper, C. Krauß, and R. Nieder-hagen. 2020. Post-Quantum Secure Boot. In2020 Design, Automation Test inEurope Conference Exhibition (DATE). 1582–1585 doi:10.23919/DATE48585.2020.9116252](https://ieeexplore.ieee.org/document/9116252) - -###### [KiKw18] -[Kiefer, Franziskus, and Krzysztof Kwiatkowski. "Hybrid ECDHE-SIDH key exchange for TLS." draft-kiefer-tls-ecdhe-sidh-00 (work in progress) (2018).](https://datatracker.ietf.org/doc/html/draft-kiefer-tls-ecdhe-sidh-00) - -###### [KKP20] -[S. Koteshwara, M. Kumar, and P. Pattnaik. 2020. Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors.In2020 IEEE International Symposium on Performance Analysis of Systems andSoftware (ISPASS). 223–225](https://ieeexplore.ieee.org/abstract/document/9238630) - -###### [KKS+20] -[A. Kuznetsov, A. Kiian, O. Smirnov, A. Cherep, M. Kanabekova, and I. Chepurko. Testing of Code-Based Pseudorandom Num- ber Generators for Post-Quantum Application. In 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), pages 172–177, 2020.](https://www.researchgate.net/publication/342456148_Testing_of_Code-Based_Pseudorandom_Number_Generators_for_Post-Quantum_Application) - -###### [KOV+18] -[A. Khalid, T. Oder, F. Valencia, M. O’ Neill, T. Güneysu, and F. Regazzoni. Physical protection of lattice-based cryptography: Challenges and solutions. In Proceedings of the 2018 on Great Lakes Symposium on VLSI, pages 365–370. ACM, 2018.](https://pure.qub.ac.uk/files/156772945/paper.pdf) - -###### [KPDG18] -[P. Kampanakis, P. Panburana, E. Daw, and D. Van Geest. 2018. The Viability of Post-quantum X.509 Certificates.IACR Cryptol. ePrint Arch.2018 (2018)](http://eprint.iacr.org/2018/063) - -###### [KSL+19] -[K. Kwiatkowski, N. Sullivan, A. Langley, D. Levin, and A. Mislove. 2019. Measuring TLS key exchange with post-quantum KEM. InWorkshop Record of the SecondPQC Standardization Conference](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/kwiatkowski-measuring-tls.pdf) - -###### [KV19] -[K. Kwiatkowski and L. Valenta. The TLS Post-Quantum Experiment, October 2019.](https://blog.cloudflare.com/the-tls-post-quantum-experiment/) - -###### [KwVa19] -[K. Kwiatkowski and L. Valenta. 2019. The TLS Post-Quantum Experiment](https://blog.cloudflare.com/the-tls-post-quantum-experiment/) - -###### [Lang19] -[A. Langley. 2019. Real-world measurements of structured-lattices and supersin-gular isogenies in TLS](https://www.imperialviolet.org/2019/10/30/pqsivssl.html) - -###### [LLP+13] -[K. Lee, Y. Lee, J. Park, K. Yim and I. You, "Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)," 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013, pp. 709-713, doi: 10.1109/IMIS.2013.128](https://ieeexplore.ieee.org/document/6603762) - -###### [LLJ20] -[Lohachab, A., Lohachab, A., & Jangra, A. (2020). A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet of Things, 9, 100174.](https://www.sciencedirect.com/science/article/abs/pii/S2542660520300159#!) - -###### [MAA+20] -[D. Moody, G. Alagic, D. C Apon, D. A. Cooper, Q. H. Dang, J. M. Kelsey, Y.Liu, C. A. Miller, R. C. Peralta, R. A. Perlner, A. Y. Robinson, D. C. Smith-Tone,and J. Alperin-Sheriff. 2020. Status report on the second round of the NISTpost-quantum cryptography standardization process.](https://doi.org/10.6028/NIST.IR.8309) - -###### [MAB+21] -[C. Aguilar Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, E. Persichetti, G. Zémor, and I. C. Bourges. Hamming quasi-cyclic (hqc). NIST PQC Round, 3, 2021](http://pqc-hqc.org/doc/hqc-specification_2021-06-06.pdf) - -###### [Mas02] -[S. Maseberg. Fail-Safe-Konzept für Public-Key-Infrastrukturen. PhDthesis, 2002.](http://tuprints.ulb.tu-darmstadt.de/246/) - -###### [MdJvH+20] -[M. Müller, J. de Jong, M. van Heesch, B. Overeinder, and R. van Rijswijk-Deij. Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC. 50(4):49–57, 2020. doi:10.1145/3431832.3431838.](https://dl.acm.org/doi/10.1145/3431832.3431838) - -<!-- ###### [Meun21] -[Robin Meunier. Post-Quantum Kryptographie - Classic McEliece. 2021 Master Thesis. Darrmstadt University of Applied Sciences. Faculty of Computer Science.](/docs/migration/McEliece.pdf) --> - -###### [MPD+18] -[L. Malina, L. Popelova, P. Dzurenda, J. Hajny, and Z. Martinasek. 2018. On Feasibility of Post-Quantum Cryptography on Small Devices (15th IFAC Conference on Programmable Devices and Embedded Systems PDeS 2018), Vol. 51. 462–467](https://www.sciencedirect.com/science/article/pii/S2405896318308474) - -###### [MRD+20] -[L. Malina, S. Ricci, P. Dzurenda, D. Smekal, J. Hajny, and T. Gerlich. 2020. Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms. In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 109–124](https://link.springer.com/chapter/10.1007/978-3-030-41025-4_8) - -###### [MW18] -[K. Mindermann and S. Wagner. Usability and Security Effects of Code Examples on Crypto APIs. In 2018 16th Annual Conference on Privacy, Security and Trust (PST), pages 1–2. IEEE, August 2018.](https://ieeexplore.ieee.org/document/8514203) - -###### [MW20] -[K. Mindermann and S. Wagner. 2020. Fluid Intelligence Doesn’t Matter! Effectsof Code Examples on the Usability of Crypto APIs. In2020 IEEE/ACM 42ndInternational Conference on Software Engineering: Companion Proceedings (ICSE-Companion). 306–307.](https://arxiv.org/abs/2004.03973) - -###### [NAB+21] -[M. Naehrig, E. Alkim, J. W Bos, L. Ducas, K. Easterbrook, B. LaMacchia, P. Longa,I. Mironov, V. Nikolaenko, C. Peikert, et al.2020. Frodokem learning with errorskey encapsulation.NIST PQC Round3 (2021)](https://frodokem.org/files/FrodoKEM-specification-20210604.pdf) - -###### [NIWA17] -[Niederhagen, R., & Waidner, M. (2017). Practical Post-Quantum Cryptography. Fraunhofer White Paper, vol. ISSN, 2192-8169](https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Practical.PostQuantum.Cryptography_WP_FraunhoferSIT.pdf?_=1503992279) - -###### [NWAO19] -[M. D. Noel, O. V. Waziri, M. S. Abdulhamid, and A. J. Ojeniyi. Stateful hash-based digital signature schemes for bitcoin cryptocurrency. In 2019 15th International Conference on Electronics, Computer and Computation (ICECCO), pages 1–6, 2019.](https://ieeexplore.ieee.org/document/9043192/) - -###### [NWE19] -[A. Neish, T. Walter, and P. Enge. Quantum-resistant authentication algorithms for satellite-based augmentation systems. Navigation, 66(1):199–209, 2019.](https://web.stanford.edu/group/scpnt/gpslab/pubs/papers/Neish_2018_IONITM_QuantumResistantAuthenticationUpdated.pdf) - -###### [OHW+18] -[M. O’Neill, S. Heidbrink, J. Whitehead, T. Perdue, L. Dickinson, T. Collett, N. Bonner, K. Seamons, and D. Zappala. The Secure Socket API: TLS as an Operating System Service. In 27th USENIX Security Symposium (USENIX Security 18), pages 799–816. USENIX Association, 2018.](https://www.usenix.org/conference/usenixsecurity18/presentation/oneill) - -###### [OP20] -[M. Ounsworth and M. Pala. Composite Keys and Signatures For Use In Internet PKI. Internet-Draft-ounsworth-pq-composite-sigs-03, Internet Engineering Task Force, July 2020. Backup Publisher: Internet Engineering Task Force Num Pages: 18](https://tools.ietf.org/id/draft-ounsworth-pq-composite-sigs-01.html) - -###### [OPP19] -[D. Ott, C. Peikert, and participants. 2019. Identifying Research Challengesin Post Quantum Cryptography Migration and Cryptographic Agility. (Sept.2019).](https://cra.org/crn/2019/10/research-challenges-in-post-quantum-cryptography-migration-and-cryptographic-agility/) - -###### [PASC20] -[S. Paul and P. Scheible. 2020. Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication. InComputerSecurity – ESORICS 2020. Vol. 12309. Springer International Publishing, 295–316](https://link.springer.com/chapter/10.1007/978-3-030-59013-0_15) - -###### [PN19] -[S. Paul and M. Niethammer. On the importance of cryptographic agility for industrial automation. at - Automatisierungstechnik, 67(5):402–416, May 2019, doi:10.1515/auto-2019-0019](http://www.degruyter.com/view/j/auto.2019.67.issue-5/auto-2019-0019/auto-2019-0019.xml) - -###### [PRKK19] -[S. Pugh, M. S. Raunak, D. R. Kuhn, and R. Kacker. Systematic Testing of Post-Quantum Cryptographic Implementations Using Metamorphic Testing. In 2019 IEEE/ACM 4th International Workshop on Metamorphic Testing (MET), pages 2–8, Montreal, QC, Canada, May 2019. IEEE, doi:10.1109/MET.2019.00009.](https://ieeexplore.ieee.org/document/8785645/) - -###### [PS20] -[S. Paul and P. Scheible. Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial m2m communica tion. In L. Chen, N. Li, K. Liang, and S. Schneider, editors, Computer Security – ESORICS 2020, volume 12309, pages 295–316. Springer In ternational Publishing, 2020. Series Title: Lecture Notes in Computer Science. doi:10.1007/978-3-030-59013-0\_15.](http://link.springer.com/10.1007/978-3-030-59013-0_15) - -###### [PST13] -[R. Perlner and D. Smith-Tone. A classification of differential invariants for multivariate post-quantum cryptosystems. In P. Gaborit, editor, Post- Quantum Cryptography, volume 7932, pages 165–173. Springer Berlin Heidelberg, 2013. Series Title: Lecture Notes in Computer Science. doi:10.1007/ 978-3-642-38616-9_11](http://link.springer.com/10.1007/978-3-642-38616-9_11) - -###### [PST19] -[C. Paquin, D. Stebila, and G. Tamvada. 2019.Benchmarking Post-QuantumCryptography in TLS. Technical Report 1447] (http://eprint.iacr.org/2019/1447) - -###### [ScSt17] -[Schanck, John M., and Douglas Stebila. "A Transport Layer Security (TLS) extension for establishing an additional shared secret." IETF Draft (2017).](https://datatracker.ietf.org/doc/html/draft-schanck-tls-additional-keyshare-00) - -###### [SFG20] -[Steblia, D., Fluhrer, S. and Gueron, S., 2020. Hybrid key exchange in TLS 1.3. Internet-Draft draft-ietf-tls-hybrid-design-02. Internet Engineering Task Force.](https://datatracker.ietf.org/doc/html/draft-ietf-tls-hybrid-design) - -###### [SKD20] -[D. Sikeridis, P. Kampanakis, and M. Devetsikiotis. 2020. Post-Quantum Authentication in TLS 1.3: A Performance Study. Technical Report 071](http://eprint.iacr.org/2020/071) - -###### [SM16] -[D. Stebila and M. Mosca. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. In R. Avanzi and H. Heys, editors, Selected Areas in Cryptography – SAC 2016, Lecture Notes in Computer Science, pages 14–37, Cham, 2016. Springer International Publishing. doi:10.1007/978-3-319-69453-5\_2.](https://eprint.iacr.org/2016/1017.pdf) - -###### [SSPB19] -[S. Samardjiska, P. Santini, E. Persichetti, and G. Banegas. A reaction attack against cryptosystems based on LRPC codes. In P. Schwabe and N. Thériault, editors, Progress in Cryptology – LATINCRYPT 2019, pages 197–216. Springer International Pub- lishing, 2019.](https://eprint.iacr.org/2019/845.pdf) - -###### [SSW20] -[Peter Schwabe, Douglas Stebila, and Thom Wiggers. 2020. Post-Quantum TLS Without Handshake Signatures. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20). Association for Computing Machinery, New York, NY, USA, 1461–1480. DOI:https://doi.org/10.1145/3372297.3423350](https://eprint.iacr.org/2020/534) - -###### [StMo16] -[D. Stebila and M. Mosca. 2016. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. In Selected Areas in Cryptography – SAC2016, R. Avanzi and H. Heys (Eds.). Springer International Publishing, 14–37](https://doi.org/10.1007/978-3-319-69453-5_2) - -###### [SWZ16] -[Schanck, John M., William Whyte, and Zhenfei Zhang. "Quantum-safe hybrid (QSH) ciphersuite for Transport Layer Security (TLS) version 1.2." IETF, Internet-Draft draft-whyte-qsh-tls (2016)](https://datatracker.ietf.org/doc/html/draft-whyte-qsh-tls12-02) - -###### [TKY21] -[Chou, Tung, Matthias J. Kannwischer, and Bo-Yin Yang. "Rainbow on Cortex-M4." IACR Cryptol. ePrint Arch. 2021 (2021): 532.](https://kannwischer.eu/papers/2021_rainbowm4.pdf) - -###### [TLW19] -[J. Tian, J. Lin, and Z. Wang. 2019. Ultra-Fast Modular Multiplication Implementa-tion for Isogeny-Based Post-Quantum Cryptography. In2019 IEEE InternationalWorkshop on Signal Processing Systems (SiPS). 97–102 doi:10.1109/SiPS47522.2019.9020384](https://ieeexplore.ieee.org/document/9020384) - -###### [TRH+20] -[Tujner, Z., Rooijakkers, T., van Heesch, M., & Önen, M. (2020). QSOR: Quantum-Safe Onion Routing. arXiv preprint arXiv:2001.03418](https://arxiv.org/abs/2001.03418) - -###### [Unr20] -[Unruh, D. (2020, December). Post-quantum verification of Fujisaki-Okamoto. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 321-352). Springer, Cham.](https://link.springer.com/chapter/10.1007/978-3-030-64837-4_11) - -###### [UWK15] -[M. Ullmann, C. Wieschebrink, and D. Kügler. Public key infrastructure and crypto agility concept for intelligent transportation systems. In Sulc, Noll (Eds.): VEHICULAR 2015: The Fourth International Conference on Advances in Vehicular Systems, Technologies and Applications. October 11-16, 2015, St. Julians, Malta, pages 14 – 19, 2015.](http://www.thinkmind.org/index.php?view=article&articleid=vehicular_2015_1_30_30028.) - -###### [vHAA+19] -[van Heesch, M., van Adrichem, N. L., Attema, T., & Veugen, T. (2019). Towards Quantum-Safe VPNs and Internet. IACR Cryptol. ePrint Arch., 2019, 1277.](https://eprint.iacr.org/2019/1277.pdf) - -###### [VBDK+20] -[M. Van Beirendonck, J. P. D’Anvers, A. Karmakar, J. Balasch, and I. Verbauwhede. A side-channel resistant implementation of saber. IACR Cryptol. ePrint Arch, 733, 2020.](https://eprint.iacr.org/2020/733.pdf) - -###### [VM12] -[V. Vasić and M. Mikuc. Security Agility Solution Independent of the Underlaying Protocol Architecture. In AT, 918 of CEUR Workshop Proceedings, pages 128–137. CEUR-WS.org, 2012.](https://www.semanticscholar.org/paper/Security-Agility-Solution-Independent-of-the-Vasic-Mikuc/489054a1f28eb26b1baa1a9f0caff2306c821695.) - -###### [WAG+21] -[Wiesmaier, A., Alnahawi, N., Grasmeyer, T., Geißler, J., Zeier, A., Bauspieß, P., & Heinemann, A. (2021). On PQC Migration and Crypto-Agility. arXiv preprint arXiv:2106.09599.](https://arxiv.org/abs/2106.09599) - -###### [WaSt20] -[Wang, W., & Stöttinger, M. (2020). Post-Quantum Secure Architectures for Automotive Hardware Secure Modules. IACR Cryptol. ePrint Arch., 2020, 26](https://eprint.iacr.org/2020/026.pdf) - -###### [WiSo21] -[Barker, William, and Murugiah Souppaya. [Project Description] Migration to Post-Quantum Cryptography (Draft). National Institute of Standards and Technology, 2021.](https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/pqc-migration-project-description-draft.pdf) - -###### [Wh+17] -[Whyte, William, et al. "Quantum-safe hybrid (QSH) key exchange for Transport Layer Security (TLS) version 1.3." IETF Draft (2017)](https://datatracker.ietf.org/doc/html/draft-whyte-qsh-tls13-06) - -###### [WvdG20] -[D. Weller and R. van der Gaag. 2020. Incorporating post-quantum cryptographyin a microservice environment. (2020), 36](https://homepages.staff.os3.nl/~delaat/rp/2019-2020/p13/report.pdf) - -###### [Xag21] -[Keita Xagawa. NTRU leads to Anonymous, Robust Public-Key Encryption. Cryptology ePrint Archive, Report 2021/741. 2021](https://eprint.iacr.org/2021/741) - -###### [YXF+18] -[Yuan, Y., Xiao, J., Fukushima, K., Kiyomoto, S., & Takagi, T. (2018). Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. Security and Communication Networks, 2018.](https://www.hindawi.com/journals/scn/2018/9846168/) - -###### [Zei20] -[A. Zeier. 08.12.2020. eucrite 1.0 API.](https://use-a-pqclib.h-da.io/eucrite-documentation/) - -###### [ZGF20] -[D. Zoni, A. Galimberti and W. Fornaciari, "Efficient and Scalable FPGA-Oriented Design of QC-LDPC Bit-Flipping Decoders for Post-Quantum Cryptography," in IEEE Access, vol. 8, pp. 163419-163433, 2020, doi: 10.1109/ACCESS.2020.3020262.](https://ieeexplore.ieee.org/document/9180360) - -###### [Zim15] -[Zimmer, Dipl-Inf Ephraim. "Post-Quantum Kryptographie für IPsec." Sicherheit in vernetzten Systemen-22. DFN-Konferenz. Ed. by Christian Paulsen. DFN-CERT. 2015.](https://svs.informatik.uni-hamburg.de/publications/2015/2015-02-24-Zimmer-DFN-PQC-fuer-IPsec.pdf) - -###### [ZWH19] -[A. Zeier, A. Wiesmaier, and A. Heinemann. API Usability of Stateful Signature Schemes. In The 14th International Workshop on Security (IWSEC), LNCS 11689, pages 1–20. Springer Switzerland, August 2019](https://link.springer.com/chapter/10.1007/978-3-030-26834-3_13) - -###### [ZWH21] -[A. Zeier, A. Wiesmaier, and A. Heinemann. Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte. In German Federal Office for Information Security (BSI), editor, Tagungsband zum 17. Deutschen IT-Sicherheitskongress, pages 381 – 391. SecuMedia Verlag, Ingelheim, Germany, March 2021.](https://arxiv.org/pdf/2102.00157v1) - -###### [ZYD+20] -[F. Zhang, B. Yang, X. Dong, S. Guilley, Z. Liu, W. He, F. Zhang, and K. Ren. Side-Channel Analysis and Countermeasure Design on ARM- based Quantum-Resistant SIKE. IEEE Transactions on Computers, pages 1–1, 2020. Conference Name: IEEE Transactions on Computers. doi: 10.1109/TC.2020.3020407.](https://ieeexplore.ieee.org/document/9181442) diff --git a/content/docs/related.md b/content/docs/related.md deleted file mode 100644 index 26e76f063e51da15932e7c7087407698e6e2b966..0000000000000000000000000000000000000000 --- a/content/docs/related.md +++ /dev/null @@ -1,25 +0,0 @@ ---- -title: "Related Work" -linktitle: "Related Work" -date: 2021-05-05T22:18:28+02:00 -draft: false -type: docs -weight: 3 ---- -A collection of survey papers and references dealing with general challenges and recommendations regarding the migration to post-quantum cryptography and cryptographic agility. - -*A full reference list can be found in the [references](../refs) section. All references are listed in alphabetical order.* - -- [Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility](http://arxiv.org/abs/1909.07353): A wide range of topics and challenges at a high abstraction level grouped into categories of PQC migration and crypto-agility [[OPp19]](../refs#opp19) -- [Getting Ready for Post-Quantum Cryptography](https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf): Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms [[BPS21]](../refs#bps21). -- [Practical Post-Quantum Cryptography](https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Practical.PostQuantum.Cryptography_WP_FraunhoferSIT.pdf?_=1503992279): White paper from the Fraunhofer Institute for Secure Information Technology SIT addressing challenges of PQC migration and comparison of PQC algorithms [[NIWA17]](../refs#niwa17). -- [From Pre-Quantum to Post-Quantum IoT Security](https://ieeexplore.ieee.org/document/8932459): Challenges for PQC in IoT and comparison of the performance of PQC algorithms [[FC20]](../refs#fc20). -- [Biggest Failures in IT Security](https://drops.dagstuhl.de/opus/volltexte/2020/11981/pdf/dagrep_v009_i011_p001_19451.pdf): A variety of problems in achieving IT security and possible strategies to solve them [[AVVY19]](../refs#avvy19). -- [Migration zu Post-Quanten-Kryptografie](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Krypto/Post-Quanten-Kryptografie.html): Recommendations for action on migration to PQC by the BSI (German Federal Office for Information Security) [[BSI20]](../refs#bsi20). -- [Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen](https://www.secumedia-shop.net/Deutschland-Digital-Sicher-30-Jahre-BSI): A brief evaluation of the current state of both post-quantum and quantum cryptography [[HLL+21]](../refs#hll21). -- [Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges](https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf): Important use cases for cryptography and potential migration strategies to transition to post-quantum cryptography [[CCD+15]](../refs#ccd15). -- [Migration to Post-Quantum Cryptography](https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/pqc-migration-project-description-draft.pdf): NCCoE and NIST Project description for PQC migration [[WiSo21]](../refs#wiso21). -- [A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks](https://www.sciencedirect.com/science/article/abs/pii/S2542660520300159#!) Open research challenges and future research directions in the field of IoT networks [[LLJ20]](../refs#llj20). -- [Post-quantum cryptography and 5G security: tutorial](https://dl.acm.org/doi/pdf/10.1145/3317549.3324882) On advancing the 3GPP 5G standards and NIST post-quantum cryptography standards in tandem, with the goal of launching a "quantum ready" 5G core network [[CMC19]](../refs#cmc19). -- [SoK: How (not) to Design and Implement Post-Quantum Cryptography](https://eprint.iacr.org/2021/462.pdf) Current state of knowledge on post-quantum cryptography. Trends, common methodologies, and pitfalls to look for and recurrent challenges [[HPA21]](../refs#hpa21). -- [On PQC Migration and Crypto-Agility](https://arxiv.org/abs/2106.09599) A literature survey and a snapshot of the discovered challenges and solutions categorized in different areas offering a single entry-point into the subject reflecting the current state [[WAG+21]](../refs#wag21). diff --git a/layouts/docs/no_index.html b/layouts/docs/no_index.html deleted file mode 100644 index 23397db0355a4a7cdde5a23834757d64592f76ab..0000000000000000000000000000000000000000 --- a/layouts/docs/no_index.html +++ /dev/null @@ -1,20 +0,0 @@ -{{ define "main" }} -<div class="td-content"> - <h1>{{ .Title }}</h1> - {{ with .Params.description }}<div class="lead">{{ . | markdownify }}</div>{{ end }} - {{ if (and (not .Params.hide_readingtime) (.Site.Params.ui.readingtime.enable)) }} - {{ partial "reading-time.html" . }} - {{ end }} - {{ .Content }} - <!-- {{ partial "section-index.html" . }} --> - {{ if (and (not .Params.hide_feedback) (.Site.Params.ui.feedback.enable) (.Site.GoogleAnalytics)) }} - {{ partial "feedback.html" .Site.Params.ui.feedback }} - <br /> - {{ end }} - {{ if (.Site.DisqusShortname) }} - <br /> - {{ partial "disqus-comment.html" . }} - {{ end }} - <div class="text-muted mt-5 pt-3 border-top">{{ partial "page-meta-lastmod.html" . }}</div> -</div> -{{ end }} diff --git a/layouts/partials/footer.html b/layouts/partials/footer.html deleted file mode 100644 index 66ae792fcde28b331e74e91606ce14bfd37fa395..0000000000000000000000000000000000000000 --- a/layouts/partials/footer.html +++ /dev/null @@ -1,43 +0,0 @@ -{{ $links := .Site.Params.links }} -<footer class="bg-dark py-5 row d-print-none"> - <div class="container-fluid mx-sm-5"> - <div class="row"> - <div class="col-6 col-sm-4 text-xs-center order-sm-2"> - {{ with $links }} - {{ with index . "user"}} - {{ template "footer-links-block" . }} - {{ end }} - {{ end }} - </div> - <div class="col-6 col-sm-4 text-right text-xs-center order-sm-3"> - {{ with $links }} - {{ with index . "developer"}} - {{ template "footer-links-block" . }} - {{ end }} - {{ end }} - </div> - <div class="col-12 col-sm-4 text-center py-2 order-sm-2"> - {{ with $links }} {{ with index . "image"}}<small><a class="text-white" href="{{ .image_url }}">{{ .text }}</a></small>{{ end }}{{ end }} - <p class="text-white"> - {{ with .Site.Params.copyright }}© {{ now.Year}} {{ .}}{{ end }} <br/> - {{ with $links }}{{ with index . "impress"}}<a class="text-white" href="{{ .url }}">{{ .text }}</a>{{ end }}{{ end }} - </p> - <!-- {{ if not .Site.Params.ui.footer_about_disable }} - {{ with .Site.GetPage "about" }}<p class="mt-2"><a href="{{ .RelPermalink }}">{{ .Title }}</a></p>{{ end }} - {{ end }} --> - </div> - </div> - </div> -</footer> - -{{ define "footer-links-block" }} -<ul class="list-inline mb-0"> - {{ range . }} - <li class="list-inline-item mx-2 h3" data-toggle="tooltip" data-placement="top" title="{{ .name }}" aria-label="{{ .name }}"> - <a class="text-white" target="_blank" rel="noopener" href="{{ .url }}" aria-label="{{ .name }}"> - <i class="{{ .icon }}"></i> - </a> - </li> - {{ end }} -</ul> -{{ end }} diff --git a/layouts/partials/page-meta-lastmod.html b/layouts/partials/page-meta-lastmod.html deleted file mode 100644 index 44c19adbf5535732cd00c9006d8e53063ef7587e..0000000000000000000000000000000000000000 --- a/layouts/partials/page-meta-lastmod.html +++ /dev/null @@ -1 +0,0 @@ -<!-- {{ T "post_last_mod"}} {{ .Lastmod.Format .Site.Params.time_format_default }}{{ with .GitInfo }}: <a href="{{ $.Site.Params.github_repo }}/commit/{{ .Hash }}">{{ .Subject }} ({{ .AbbreviatedHash }})</a>{{end }} --> diff --git a/layouts/shortcodes/blocks/cover.html b/layouts/shortcodes/blocks/cover.html deleted file mode 100644 index f7a540b4ae865c662558f81ad9e796ca8758b193..0000000000000000000000000000000000000000 --- a/layouts/shortcodes/blocks/cover.html +++ /dev/null @@ -1,50 +0,0 @@ -{{ $_hugo_config := `{ "version": 1 }` }} -{{ $blockID := printf "td-cover-block-%d" .Ordinal }} -{{ $promo_image := (.Page.Resources.ByType "image").GetMatch "**background*" }} -{{ $logo_image := (.Page.Resources.ByType "image").GetMatch "**logo*" }} -{{ $col_id := .Get "color" | default "dark" }} -{{ $image_anchor := .Get "image_anchor" | default "smart" }} -{{ $logo_anchor := .Get "logo_anchor" | default "smart" }} -{{/* Height can be one of: auto, min, med, max, full. */}} -{{ $height := .Get "height" | default "max" }} -{{ $byline := .Get "byline" | default "" }} -{{ with $promo_image }} -{{ $promo_image_big := (.Fill (printf "1920x1080 %s" $image_anchor)) }} -{{ $promo_image_small := (.Fill (printf "960x540 %s" $image_anchor)) }} -<link rel="preload" as="image" href="{{ $promo_image_small }}" media="(max-width: 1200px)"> -<link rel="preload" as="image" href="{{ $promo_image_big }}" media="(min-width: 1200px)"> -<style> -#{{ $blockID }} { - background-image: url({{ $promo_image_small }}); -} -@media only screen and (min-width: 1200px) { - #{{ $blockID }} { - background-image: url({{ $promo_image_big }}); - } -} -</style> -{{ end }} -<section id="{{ $blockID }}" class="row td-cover-block td-cover-block--height-{{ $height }} js-td-cover td-overlay td-overlay--dark -bg-{{ $col_id }}"> - <div class="container td-overlay__inner"> - <div class="row"> - <div class="col-12"> - <div class="text-center"> - {{ with .Get "title" }}<h1 class="display-1 mt-0 mt-md-5 pb-4">{{ $title := . }}{{ with $logo_image }}{{ $logo_image_resized := (.Fit (printf "70x70 %s" $logo_anchor)) }}<img class="td-cover-logo" src="{{ $logo_image_resized }}" alt="{{ $title | html }} Logo">{{ end }}{{ $title | html }}</h1>{{ end }} - {{ with .Get "subtitle" }}<p class="display-2 text-uppercase mb-0">{{ . | html }}</p>{{ end }} - <div class="pt-3 lead"> - {{ if eq .Page.File.Ext "md" }} - {{ .Inner | markdownify }} - {{ else }} - {{ .Inner | htmlUnescape | safeHTML }} - {{ end }} - </div> - </div> - </div> - </div> - </div> - {{ if $byline }} - <div class="byline"> - <small>{{ $byline }}</small> - </div> - {{ end }} -</section> diff --git a/mindmap_gen/mindmap_gen.py b/mindmap_gen/mindmap_gen.py deleted file mode 100644 index 65b244ff7a2f3db1f45ebca92ebaecd4a0fdc2cd..0000000000000000000000000000000000000000 --- a/mindmap_gen/mindmap_gen.py +++ /dev/null @@ -1,111 +0,0 @@ -import glob -import re -import os -import argparse - - -class Entry: - - def __init__(self, dir_name, file_name, file_title, ref_count): - self.dir_name = dir_name - self.file_name = file_name - self.file_title = file_title - self.ref_count = ref_count - - @staticmethod - def get_root(): - return "Cryptographic Migration & Agility" - - def get_dir(self): - return self.dir_name - - def get_file(self): - return self.file_name - - def get_title(self): - return self.file_title - - def get_refs(self): - return self.ref_count - - -class MarkdownParser: - - def __init__(self, markdown_dir_path): - self.markdown_dir_path = markdown_dir_path - - def find_markdown_files(self): - return glob.glob(self.markdown_dir_path + '/**/*.md', recursive=True) - - def generate_mindmap_file(self): - md_files = self.find_markdown_files() - entries = [] - - # Iterate files and create entries - for md_file in md_files: - dir_name = self.get_md_dir_name(md_file) - file_name = self.get_md_file_name(md_file) - file_title = self.get_md_file_title(md_file) - ref_count = self.get_md_ref_count(md_file) - - if ref_count > 0: - entries.append(Entry(dir_name, file_name, file_title, ref_count)) - - # Write entries to file - f = open("mindmap_gen/mindmap.md", "w", encoding="utf8") - f.write(self.generate_mindmap(entries)) - f.close() - - def generate_mindmap(self, entries): - prev_dir = "" - mm_str = "" - mm_str += ("- " + entries[0].get_root() + "\n") - for entry in entries: - if entry.get_dir() != "agility" and entry.get_dir() != "migration": - continue - if entry.get_dir() == prev_dir: - if entry.get_dir() == "": - mm_str += (" - " + entry.get_title() + " (Refs: " + str(entry.get_refs()) + ")\n") - else: - mm_str += (" - " + entry.get_title() + " (Refs: " + str(entry.get_refs()) + ")\n") - else: - mm_str += (" - " + entry.get_dir().capitalize() + "\n") - mm_str += (" - " + entry.get_title() + " (Refs: " + str(entry.get_refs()) + ")\n") - prev_dir = entry.get_dir() - - return mm_str - - def get_md_file_title(self, md_file_path): - with open(md_file_path, 'r', encoding="utf8") as file: - data = file.read() - return re.search("title: \"(.*)\"", data).group(1) - - def get_md_file_name(self, md_file_path): - file_name = os.path.basename(md_file_path) - return file_name - - def get_md_dir_name(self, md_file_path): - dir_name = os.path.basename(os.path.dirname(md_file_path)) - if dir_name == "docs": - dir_name = "" - return dir_name - - def get_md_ref_count(self, md_file_path): - ref_regex = "\.\.\/refs#(.+)\)" - file_handle = open(md_file_path, mode='r', encoding ="utf8") - ref_count = 0 - - for line in file_handle.readlines(): - match = re.search(ref_regex, line) - if match is not None: - ref_count += 1 - return ref_count - - -parser = argparse.ArgumentParser() -parser.add_argument('-d', '--directory', help='Path to content directory', required=True) -args = parser.parse_args() -content_dir = args.directory - -md_parser = MarkdownParser(content_dir) -md_parser.generate_mindmap_file()