Post-quantum hybrid key exchange: a systematic mapping study

被引:4
|
作者
Giron, Alexandre Augusto [1 ,2 ]
Custodio, Ricardo [1 ]
Rodriguez-Henriquez, Francisco [3 ,4 ]
机构
[1] Univ Fed Santa Catarina, Dept Informat & Stat, Grad Program Comp Sci, BR-88000000 Florianopolis, SC, Brazil
[2] Univ Tecnol Fed Parana, BR-85902000 Toledo, Parana, Brazil
[3] Technol Innovat Inst, Cryptog Res Ctr, Abu Dhabi 51133, U Arab Emirates
[4] CINVESTAV IPN, Comp Sci Dept, Mexico City 72310, DF, Mexico
关键词
Post-quantum cryptography; Hybrid key exchange; Systematic mapping study; PROTOCOLS; SECURITY;
D O I
10.1007/s13389-022-00288-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A key exchange protocol (KEX) is a mechanism that allows two parties to secure their communications using encryption. Since it was apparent that large-scale quantum computers can comfortably break most commonly used cryptographic protocols, proposals of quantum-safe KEX began to appear. Some of these proposals combine well-known classical cryptographic key exchange protocols with novel post-quantum schemes. The main rationale behind this hybrid structure is to retain the time-tested trust on "pre-quantum KEXs" while facilitating a smoother transition toward a post-quantum world. In this paper we present a systematic mapping study of post-quantum hybrid KEXs, given insights into their characteristics, terminology, efficiency, security and open design challenges. Furthermore, we propose a hybrid KEX classification taking into account several relevant design considerations associated to these schemes. Our systematic mapping shows that primary research in this subject strongly suggests that hybrid KEXs achieve an acceptable performance for a number of important applications, and that they can fit into widely used network protocols. These features indicate that hybrid KEX will shortly become an important building block for secure network communications, even in a worst-case scenario where large-scale quantum computers are prevalent.
引用
收藏
页码:71 / 88
页数:18
相关论文
共 50 条
  • [21] Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange Protocols
    Aysu, Aydin
    Tobah, Youssef
    Tiwari, Mohit
    Gerstlauer, Andreas
    Orshansky, Michael
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 81 - 88
  • [22] Analysis of Network-level Key Exchange Protocols in the Post-Quantum Era
    Pazienza, Andrea
    Lella, Eufemia
    Noviello, Pietro
    Vitulano, Felice
    2022 IEEE 15TH WORKSHOP ON LOW TEMPERATURE ELECTRONICS (WOLTE 2022), 2022,
  • [23] Secure post-quantum group key exchange: Implementing a solution based on Kyber
    Pablos, Jose Ignacio Escribano
    Vasco, Maria Isabel Gonzalez
    IET COMMUNICATIONS, 2023, 17 (06) : 758 - 773
  • [24] Experimental Integration of Quantum Key Distribution and Post-Quantum Cryptography in a Hybrid Quantum-Safe Cryptosystem
    Garms, Lydia
    Paraiso, Taofiq K.
    Hanley, Neil
    Khalid, Ayesha
    Rafferty, Ciara
    Grant, James
    Newman, James
    Shields, Andrew J.
    Cid, Carlos
    O'Neill, Maire
    ADVANCED QUANTUM TECHNOLOGIES, 2024, 7 (04)
  • [25] Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber
    Escribano Pablos, Jose Ignacio
    Gonzalez Vasco, Maria Isabel
    Marriaga, Misael Enrique
    Perez del Pozo, Angel Luis
    MATHEMATICS, 2020, 8 (10) : 1 - 23
  • [26] Filianore: Better Multiplier Architectures for LWE-based Post-Quantum Key Exchange
    Bian, Song
    Hiromoto, Masayuki
    Sato, Takashi
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [27] Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World
    Ding, Jintai
    Alsayigh, Saed
    Lancrenon, Jean
    Saraswathy, R., V
    Snook, Michael
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 183 - 204
  • [28] Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
    Bos, Joppe W.
    Costello, Craig
    Naehrig, Michael
    Stebila, Douglas
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 553 - 570
  • [29] Experimental authentication of quantum key distribution with post-quantum cryptography
    Wang, Liu-Jun
    Zhang, Kai-Yi
    Wang, Jia-Yong
    Cheng, Jie
    Yang, Yong-Hua
    Tang, Shi-Biao
    Yan, Di
    Tang, Yan-Lin
    Liu, Zhen
    Yu, Yu
    Zhang, Qiang
    Pan, Jian-Wei
    NPJ QUANTUM INFORMATION, 2021, 7 (01)
  • [30] Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 : 35 - 65