Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques

Olaf Grote, A. Ahrens, C. Benavente-Peces
{"title":"Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques","authors":"Olaf Grote, A. Ahrens, C. Benavente-Peces","doi":"10.5220/0008162800910098","DOIUrl":null,"url":null,"abstract":"General security protocols use cryptographic schemes which are not prepared against quantum attacks. Asymmetric public key cryptographic schemes based on well researched methods are defined as broken, from quantum computer perspective. In contrast, symmetric cryptographic schemes and there methods are considered quantum-safe. A new effective strategy is necessary with focusing on post-quantum cryptography for evaluating and researching new quantum-safe cryptographic principles and crypto-agility to update vulnerable security protocols.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Pervasive and Embedded Computing and Communication Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0008162800910098","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

General security protocols use cryptographic schemes which are not prepared against quantum attacks. Asymmetric public key cryptographic schemes based on well researched methods are defined as broken, from quantum computer perspective. In contrast, symmetric cryptographic schemes and there methods are considered quantum-safe. A new effective strategy is necessary with focusing on post-quantum cryptography for evaluating and researching new quantum-safe cryptographic principles and crypto-agility to update vulnerable security protocols.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
后量子密码学范式与密码敏捷性:量子安全技术的策略方法
一般的安全协议使用的加密方案没有针对量子攻击的准备。从量子计算机的角度来看,基于研究方法的非对称公钥加密方案被定义为破坏。相反,对称密码方案及其方法被认为是量子安全的。为了评估和研究新的量子安全加密原理和加密敏捷性,以更新脆弱的安全协议,需要一种新的有效策略来关注后量子密码学。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Two Approaches to Resource Allocation in Hybrid Fog and Cloud Systems On Verify and Validate a Next Generation Automotive Communication Networka Interdependent Multi-layer Spatial Temporal-based Caching in Heterogeneous Mobile Edge and Fog Networks Security for Low-end Automotive Sensors: A Tire-pressure and Rain-light Sensors Case Study Influence of Emotions on Software Developer Productivity
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1