Implementing Post-quantum Cryptography for Developers

5Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The possibility of a quantum computer threatens modern public key cryptography. Post-quantum cryptographic algorithms are designed to protect sensitive data and communications also against an attacker equipped with a quantum computer. National Institute of Standards and Technology is standardizing postquantum algorithms that could replace currently used public key cryptographic algorithms in key exchange and digital signatures. Lattice-based cryptography is one of the post-quantum algorithm groups with the biggest potential. Cryptography libraries are used by developers in all kinds of different solutions, but currently the availability of post-quantum algorithms in open-source libraries is very limited. Implementing post-quantum algorithms into a software library involves a multitude of challenges. We integrated three lattice-based postquantum algorithms into a fork of Crypto++, a C++ cryptography library. We analyzed challenges in the implementation process and the performance and security of the fork. Especially the complex mathematical ideas behind the algorithms make implementation difficult. The performance of the algorithms was satisfactory but analyzing the security of the implementation in more detail is needed.

Cite

CITATION STYLE

APA

Hekkala, J., Halunen, K., & Vallivaara, V. (2022). Implementing Post-quantum Cryptography for Developers. In International Conference on Information Systems Security and Privacy (pp. 73–83). Science and Technology Publications, Lda. https://doi.org/10.5220/0010786200003120

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free