KEMTLS vs. post-quantum TLS: Performance on embedded systems

R Gonzalez, T Wiggers - … Conference on Security, Privacy, and Applied …, 2022 - Springer
TLS is ubiquitous in modern computer networks. It secures transport for high-end desktops
and low-end embedded devices alike. However, the public key cryptosystems currently used …

On IND-qCCA security in the ROM and its applications: CPA security is sufficient for TLS 1.3

L Huguenin-Dumittan, S Vaudenay - … on the Theory and Applications of …, 2022 - Springer
Abstract Bounded IND-CCA security (IND-qCCA) is a notion similar to the traditional IND-
CCA security, except the adversary is restricted to a constant number q of decryption …

SoK: Post-Quantum TLS Handshake

N Alnahawi, J Müller, J Oupický… - Cryptology ePrint …, 2023 - eprint.iacr.org
Abstract Transport Layer Security (TLS) is the backbone security protocol of the Internet. As
this fundamental protocol is at risk from future quantum attackers, many proposals have …

Post-quantum hybrid KEMTLS performance in simulated and real network environments

AA Giron, JPA do Nascimento, R Custódio… - … on Cryptology and …, 2023 - Springer
Abstract Integrating Post-Quantum Cryptography (PQC) in network protocols presents a
significant challenge. The efficiency of the Transport Layer Security (TLS) protocol can be …

[HTML][HTML] Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based Encryption

TL Astrizi, R Custódio - Sensors, 2024 - mdpi.com
We propose a novel solution to streamline the migration of existing Transport Layer Security
(TLS) protocol implementations to a post-quantum Key Encapsulation Mechanism for …

Quantum-Resistant MACsec and IPsec for Virtual Private Networks

SL Gazdag, S Grundner-Culemann, T Heider… - … on Research in Security …, 2023 - Springer
Despite considerable progress in theoretical post-quantum cryptography we have yet to see
significant advances in its practical adoption. The necessary protocol modifications need to …

[PDF][PDF] Post-quantum tls

TV Wiggers - 2024 - repository.ubn.ru.nl
The internet is secured using a cryptographic system called TLS; also known from the 'lock
on the browser'. However, the building blocks of that system are in need of replacement …

Post-quantum Secure ZRTP

L Ferreira, J Pascal - International Conference on Post-Quantum …, 2024 - Springer
ZRTP is an authenticated key exchange protocol for establishing secure communications for
Voice over IP applications. In this paper, we devise a post-quantum variant of ZRTP that …

Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems

MJD Vermeer, C Heitzenrater, E Parker… - Journal of Critical …, 2024 - Wiley Online Library
Quantum computing is expected to eventually be able to break the public‐key cryptography
algorithms currently used throughout information technology (IT) infrastructure, undermining …

Modular design of KEM-based authenticated key exchange

C Boyd, B de Kock, L Millerjord - Australasian Conference on Information …, 2023 - Springer
A key encapsulation mechanism (KEM) is a basic building block for key exchange which
must be combined with long-term keys in order to achieve authenticated key exchange …