Post-quantum hybrid key exchange: a systematic mapping study

被引:4
|
作者
Giron, Alexandre Augusto [1 ,2 ]
Custodio, Ricardo [1 ]
Rodriguez-Henriquez, Francisco [3 ,4 ]
机构
[1] Univ Fed Santa Catarina, Dept Informat & Stat, Grad Program Comp Sci, BR-88000000 Florianopolis, SC, Brazil
[2] Univ Tecnol Fed Parana, BR-85902000 Toledo, Parana, Brazil
[3] Technol Innovat Inst, Cryptog Res Ctr, Abu Dhabi 51133, U Arab Emirates
[4] CINVESTAV IPN, Comp Sci Dept, Mexico City 72310, DF, Mexico
关键词
Post-quantum cryptography; Hybrid key exchange; Systematic mapping study; PROTOCOLS; SECURITY;
D O I
10.1007/s13389-022-00288-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A key exchange protocol (KEX) is a mechanism that allows two parties to secure their communications using encryption. Since it was apparent that large-scale quantum computers can comfortably break most commonly used cryptographic protocols, proposals of quantum-safe KEX began to appear. Some of these proposals combine well-known classical cryptographic key exchange protocols with novel post-quantum schemes. The main rationale behind this hybrid structure is to retain the time-tested trust on "pre-quantum KEXs" while facilitating a smoother transition toward a post-quantum world. In this paper we present a systematic mapping study of post-quantum hybrid KEXs, given insights into their characteristics, terminology, efficiency, security and open design challenges. Furthermore, we propose a hybrid KEX classification taking into account several relevant design considerations associated to these schemes. Our systematic mapping shows that primary research in this subject strongly suggests that hybrid KEXs achieve an acceptable performance for a number of important applications, and that they can fit into widely used network protocols. These features indicate that hybrid KEX will shortly become an important building block for secure network communications, even in a worst-case scenario where large-scale quantum computers are prevalent.
引用
收藏
页码:71 / 88
页数:18
相关论文
共 50 条
  • [31] Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (09) : 1141 - 1163
  • [32] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13277 LNCS : 402 - 432
  • [33] Post-Quantum Signal Key Agreement from SIDH
    Dobson, Samuel
    Galbraith, Steven D.
    POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 422 - 450
  • [34] Key Reuse Attacks on Post-quantum Cryptosystems, Revisited
    Wang, Ke
    Zhang, Zhenfeng
    Jiang, Haodong
    Xie, Huiqin
    Li, Yanjun
    Sun, Ying
    Han, Lidong
    COMPUTER JOURNAL, 2024, 67 (01): : 323 - 337
  • [35] Revisiting Anonymity in Post-quantum Public Key Encryption
    Cheng, Yao
    Lu, Xianhui
    Li, Ziyi
    Li, Bao
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 336 - 370
  • [36] Post-Quantum Key Exchange on ARMv8-A: A New Hope for NEON Made Simple
    Streit, Silvan
    De Santis, Fabrizio
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (11) : 1651 - 1662
  • [37] Bit Flipping Key Encapsulation for the Post-Quantum Era
    Nosouhi, Mohammad Reza
    Shah, Syed Wajid Ali
    Pan, Lei
    Doss, Robin
    IEEE ACCESS, 2023, 11 : 56181 - 56195
  • [38] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 402 - 432
  • [39] A Study of Post Quantum Cipher Suites for Key Exchange
    Garcia, Daniel
    Liu, Hong
    2021 IEEE VIRTUAL IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY, 2021,
  • [40] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +