Implementing Post-quantum Cryptography for Developers
Hekkala, Julius; Halunen, Kimmo; Vallivaara, Visa (2022-02-11)
Hekkala, Julius
Halunen, Kimmo
Vallivaara, Visa
SCITEPRESS Science And Technology Publications
11.02.2022
Hekkala, J.; Halunen, K. and Vallivaara, V. (2022). Implementing Post-quantum Cryptography for Developers. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-553-1; ISSN 2184-4356, SciTePress, pages 73-83. DOI: 10.5220/0010786200003120
https://rightsstatements.org/vocab/InC/1.0/
© 2022 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved.
https://rightsstatements.org/vocab/InC/1.0/
© 2022 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved.
https://rightsstatements.org/vocab/InC/1.0/
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:oulu-202402081639
https://urn.fi/URN:NBN:fi:oulu-202402081639
Tiivistelmä
Abstract
The possibility of a quantum computer threatens modern public key cryptography. Post-quantum cryptographic algorithms are designed to protect sensitive data and communications also against an attacker equipped with a quantum computer. National Institute of Standards and Technology is standardizing post-quantum algorithms that could replace currently used public key cryptographic algorithms in key exchange and digital signatures. Lattice-based cryptography is one of the post-quantum algorithm groups with the biggest potential. Cryptography libraries are used by developers in all kinds of different solutions, but currently the availability of post-quantum algorithms in open-source libraries is very limited. Implementing post-quantum algorithms into a software library involves a multitude of challenges. We integrated three lattice-based post-quantum algorithms into a fork of Crypto++, a C++ cryptography library. We analyzed challenges in the implementation process and the performance an d security of the fork. Especially the complex mathematical ideas behind the algorithms make implementation difficult. The performance of the algorithms was satisfactory but analyzing the security of the implementation in more detail is needed.
The possibility of a quantum computer threatens modern public key cryptography. Post-quantum cryptographic algorithms are designed to protect sensitive data and communications also against an attacker equipped with a quantum computer. National Institute of Standards and Technology is standardizing post-quantum algorithms that could replace currently used public key cryptographic algorithms in key exchange and digital signatures. Lattice-based cryptography is one of the post-quantum algorithm groups with the biggest potential. Cryptography libraries are used by developers in all kinds of different solutions, but currently the availability of post-quantum algorithms in open-source libraries is very limited. Implementing post-quantum algorithms into a software library involves a multitude of challenges. We integrated three lattice-based post-quantum algorithms into a fork of Crypto++, a C++ cryptography library. We analyzed challenges in the implementation process and the performance an d security of the fork. Especially the complex mathematical ideas behind the algorithms make implementation difficult. The performance of the algorithms was satisfactory but analyzing the security of the implementation in more detail is needed.
Kokoelmat
- Avoin saatavuus [38841]