diff --git a/content/docs/papers/agility.md b/content/docs/papers/agility.md index 97ee4f47245695a15b35679d88cee19adbed67d0..034b70384cfedf69dd350d2960ac561809366291 100644 --- a/content/docs/papers/agility.md +++ b/content/docs/papers/agility.md @@ -9,4 +9,4 @@ weight: 2 Cryptographic primitives and protocols require constant modifications and adaptations in order to maintain the security of IT-systems. Many researchers argue that applying the notion of crypto-agility provides more feasible and practical updating of cryptographic systems, especially in the light of the expected transition to PQC. However, there is no unified definition for this notion, nor a common understanding of the requirements that can enable it. Moreover, it is not entirely clear what measures need to be taken in order to apply crypto-agility in practice, and which aspects and challenges exist towards this endeavor. We compare the various definitions of crypto-agility including its requirements and varying facets, and investigate the state of readiness of crypto-agility by surveying works dealing with general challenges and recommendations in this regard. We present the survey and discuss discovered challenges and solutions and utilize our findings to evaluate the state of readiness for crypto-agility. - [AWG+22] N. Alnahawi, A. Wiesmaier, T. Graßmeyer, J. Geißler, A. Zeier, P. Bauspieß, and A. Heinemann.On the State of Crypto Agility. Accepted at 18. Deutscher IT-Sicherheitskongress, 2022 + [ASW+22] Alnahawi, N. ; Schmitt, N. ; Wiesmaier, A. ; Graßmeyer, A. Heinemann T.: On the State of Crypto Agility. In: Tagungsband zum 18. Deutschen IT-Sicherheitskongress. Bd. 18 : SecuMedia Verlags-GmbH, 2022. — Backup Publisher: BSI — ISBN 978-3-922746-84-3, S. 103–126 diff --git a/content/docs/papers/migration.md b/content/docs/papers/migration.md index 55aeb4aac6deaa7521b8e778c3f357fab0169c08..365ba49b08bc96214d3269de745eeb3393832a05 100644 --- a/content/docs/papers/migration.md +++ b/content/docs/papers/migration.md @@ -5,7 +5,7 @@ draft: false type: docs weight: 1 --- -**Publication link coming soon!** +**[Publication Link!](https://dl.gi.de/handle/20.500.12116/37746)** The effort of safeguarding current and future IT from quantum computers implies more than the mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this