![]() High quality (high entropy) random data is crucial for correct operations of PKC and some symmetric algorithms, and also for the future Post-Quantum Cryptography/ Quantum-Safe Cryptography algorithms. The same session key can be used to decrypt the data and verify that it was not altered during transit. Symmetric Key Cryptosystems - Authenticated Encryption (AE)Īuthenticated Encryption (AE) is used to protect utility data while in transit.ĪE works by enciphering the secret plaintext data with the session encryption key using a Cipher function, such as Advanced Encryption Standard (AES), and further authenticating the encrypted data with a Message Authentication Code (MAC) - which may be a keyed Hash MAC (hmac-sha2-512) or may be combined with encryption as is done in case of AES-GCM - producing an authenticated ciphertext. Peer Authentication using digital signatures provides Identification, Access Control, and Data Origin authentication.Session Key Agreement using key exchange for agreeing upon Symmetric Session keys for Authenticated Encryption.On online communications security application domain these algorithms are used for The security of these algorithms depends on difficulty of number theoretic problems such as Integer Factorization and the Discrete Logarithm Problem over various groups, and the theory behind these systems was derived between late 1960’s and early 1980’s. Elliptic Curve (ECDH, ECDSA) cryptosystems for key exchange and signaturesĬollectively these are called as Classical PKC.RSA (Rivest-Shamir-Adleman) cryptosystem for signatures and encryption.Currently these functions are primarily implemented using the Most communication protocols rely on Public Key Cryptographic (PKC) functions: public key encryption, digital signatures, and key exchange to enable scalability and usability by removing need for prior key agreement before communications. In addition to using PKC, these communications protocols utilize symmetric key encryption cryptosystems, such as Authenticated Encryption, and Random Bit Generators. Protocols like TLS (Transport Layer Security), SSH (Secure Shell), and IPsec (IP security) support applications that are important to our economy, our security, and our way of life, such as mobile phones, banking, internet commerce, social networks, cloud computing, and connected devices. Since mid 1990’s Public Key Cryptography (PKC) has become a basic building component of global communication digital infrastructure. ![]() Contents Background and Introduction to Post-Quantum Cryptography Public Key Cryptosystems (PKC) Symmetric Key Cryptosystems - Authenticated Encryption (AE) Random Number Generation Quantum Computers and Quantum Threat Impact of Grover’s algorithms Impact of Shor’s algorithm Post-Quantum Cryptography Alternatives for mitigating the Quantum Threat Global standard on PQC & certificates German recommendation US recommendations UK recommendations Preparation for Migration ETSI PQC and FIPS 140-2 validation, and FIPS 140-3 validation SSH Quantum Technology References Background and Introduction Post-Quantum Cryptography
0 Comments
Leave a Reply. |