Current state of standardization of post-quantum cryptography
Abstract
The paper provides an overview and analysis of the current state of standardization of post-quatic cryptography. The development of quantum computers threatens the security of cryptographic algorithms used today. To counter this threat, the field of post-quantum cryptography was launched. But deploying new cryptographic systems takes a lot of time and effort. Thus, policymakers and system owners must be prepared. Currently, standards bodies continue to standardize protocols built using pre-quantum systems that cannot withstand quantum attacks. To such protocols, it is advisable to exchange the concept of hybrid systems (double encryption, double KEM, double signatures, etc.). However, this is not in the current plan. Therefore, it is possible to obtain post-quantum integration when developing new standards or updating existing ones.
References
Robert J. McEliece. A public-key cryptosystem based on algebraic coding theory, 1978. JPL DSN Progress Report. Available at: http://ipnpr.jpl.nasa.gov/progress_ report2/42-44/44N.PDF.
Jason A. Donenfeld. WireGuard: Next generation kernel network tunnel. In ISOC Network and Distributed System Security Symposium/ 2017. The Internet Society, February/March 2017.
Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Florian Weber, and Philip R. Zimmermann. Post-quantum WireGuard. Cryptology ePrint Archive, Report 2020/379, 2020. Available at: https://eprint.iacr.org/2020/379.
ETSI Technical Report. Quantum-safe virtual private networks. ETSI TR 103, 2018. Available: https://www.etsi.org/deliver/etsi_tr/103600_103699/103617/01.01.01_60/tr_103617v010101p.pdf.
Bas Westerban. Sizing up post-quantum signatures, 2201. https://blog.cloudflare.com/sizing-up-post-quantum-signatures/.
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and Mark Zhandry. Random oracles in a quantum world. In Dong Hoon Lee and Xiaoyun Wang, editors, Advances in Cryptology – ASIACRYPT 2011, volume 7073 of Lecture Notes in Computer Science, pages 41– 69. Springer, Heidelberg, December 2011.
Copyright (c) 2023 Єлизавета Острянська, Юрій Горбенко (Автор)

This work is licensed under a Creative Commons Attribution 4.0 International License.