Post-quantum hybrid key exchange: a systematic mapping study

被引:4
|
作者
Giron, Alexandre Augusto [1 ,2 ]
Custodio, Ricardo [1 ]
Rodriguez-Henriquez, Francisco [3 ,4 ]
机构
[1] Univ Fed Santa Catarina, Dept Informat & Stat, Grad Program Comp Sci, BR-88000000 Florianopolis, SC, Brazil
[2] Univ Tecnol Fed Parana, BR-85902000 Toledo, Parana, Brazil
[3] Technol Innovat Inst, Cryptog Res Ctr, Abu Dhabi 51133, U Arab Emirates
[4] CINVESTAV IPN, Comp Sci Dept, Mexico City 72310, DF, Mexico
关键词
Post-quantum cryptography; Hybrid key exchange; Systematic mapping study; PROTOCOLS; SECURITY;
D O I
10.1007/s13389-022-00288-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A key exchange protocol (KEX) is a mechanism that allows two parties to secure their communications using encryption. Since it was apparent that large-scale quantum computers can comfortably break most commonly used cryptographic protocols, proposals of quantum-safe KEX began to appear. Some of these proposals combine well-known classical cryptographic key exchange protocols with novel post-quantum schemes. The main rationale behind this hybrid structure is to retain the time-tested trust on "pre-quantum KEXs" while facilitating a smoother transition toward a post-quantum world. In this paper we present a systematic mapping study of post-quantum hybrid KEXs, given insights into their characteristics, terminology, efficiency, security and open design challenges. Furthermore, we propose a hybrid KEX classification taking into account several relevant design considerations associated to these schemes. Our systematic mapping shows that primary research in this subject strongly suggests that hybrid KEXs achieve an acceptable performance for a number of important applications, and that they can fit into widely used network protocols. These features indicate that hybrid KEX will shortly become an important building block for secure network communications, even in a worst-case scenario where large-scale quantum computers are prevalent.
引用
收藏
页码:71 / 88
页数:18
相关论文
共 50 条
  • [41] POST-QUANTUM HYBRID ENCRYPTION SCHEME FOR BLOCKCHAIN APPLICATION
    Hendy, Kevin
    Wicaksana, Arya
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2022, 18 (06): : 1701 - 1717
  • [42] Post-Quantum Hybrid Security Mechanism for MIMO Systems
    Qassim, Yousef
    Magana, Mario Edgardo
    Yavuz, Attila
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 684 - 689
  • [43] PiLike: Post-Quantum Identity-Based Lightweight Authenticated Key Exchange Protocol for IIoT Environments
    Gupta, Daya Sagar
    IEEE SYSTEMS JOURNAL, 2024, 18 (01): : 15 - 23
  • [44] Efficient Post-Quantum TLS Handshakes using Identity-Based Key Exchange from Lattices
    Banerjee, Utsav
    Chandrakasan, Anantha P.
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [45] Hybrid Post-quantum Signatures in Hardware Security Keys
    Ghinea, Diana
    Kaczmarczyck, Fabian
    Pullman, Jennifer
    Cretin, Julien
    Kolbl, Stefan
    Misoczki, Rafael
    Picod, Jean-Michel
    Invernizzi, Luca
    Bursztein, Elie
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 480 - 499
  • [46] Post-quantum verifier-based three-party password authenticated key exchange protocol
    Lian H.
    Hou H.
    Zhao Y.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (04): : 95 - 106
  • [48] Post-quantum distributed ledger technology: a systematic survey
    Parida, Nikhil Kumar
    Jatoth, Chandrashekar
    Reddy, V. Dinesh
    Hussain, Md. Muzakkir
    Faizi, Jamilurahman
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [49] Post-quantum distributed ledger technology: a systematic survey
    Nikhil Kumar Parida
    Chandrashekar Jatoth
    V. Dinesh Reddy
    Md. Muzakkir Hussain
    Jamilurahman Faizi
    Scientific Reports, 13
  • [50] Efficient module learning with errors-based post-quantum password-authenticated key exchange
    Ren, Peixin
    Gu, Xiaozhuo
    Wang, Ziliang
    IET INFORMATION SECURITY, 2023, 17 (01) : 3 - 17