Post-Quantum Authentication Schemes

被引:1
|
作者
Mendiola, Mark A. [1 ]
Gillis, James T. [2 ]
Binder, Andrew J. [1 ]
Haddad, Ranwa [2 ]
机构
[1] Aerosp Corp, Nav & Geopositioning Syst Dept, El Segundo, CA 90245 USA
[2] Aerosp Corp, El Segundo, CA 90245 USA
关键词
D O I
10.33012/2020.17747
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
Many authentication methods have been proposed to authenticate GNSS and SBAS civil signals in response to signal interference threats. These proposed methods utilize contemporary cryptographic standards. However, quantum computing poses a threat to currently existing authentication schemes that may render them insecure. Thus, it is vital to implement authentication methods that are quantum resistant to protect GNSS and SBAS signals well into the future. This paper briefly discusses the impact of quantum computing on contemporary cryptographic standards. A review of the post-quantum digital signature authentication schemes from the NIST post-quantum cryptography standardization competition is presented. Schemes that are applicable to GNSS and SBAS authentication are then identified. Next, a brief introduction to multivariate cryptography is presented. The paper concludes with a discussion on how the post-quantum schemes can used to authenticate GNSS and SBAS data.
引用
收藏
页码:3812 / 3825
页数:14
相关论文
共 50 条
  • [1] Efficient and reliable post-quantum authentication
    D'Arco, Paolo
    De Prisco, Roberto
    Pozo, Angel Perez del
    [J]. THEORETICAL COMPUTER SCIENCE, 2024, 1003
  • [2] QUIC Protocol with Post-quantum Authentication
    Raavi, Manohar
    Wuthier, Simeon
    Chandramouli, Pranav
    Zhou, Xiaobo
    Chang, Sang-Yoon
    [J]. INFORMATION SECURITY, ISC 2022, 2022, 13640 : 84 - 91
  • [3] Post-quantum cryptographic schemes based on codes
    Baldi, Marco
    [J]. 2017 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2017, : 908 - 910
  • [4] Experimental authentication of quantum key distribution with post-quantum cryptography
    Wang, Liu-Jun
    Zhang, Kai-Yi
    Wang, Jia-Yong
    Cheng, Jie
    Yang, Yong-Hua
    Tang, Shi-Biao
    Yan, Di
    Tang, Yan-Lin
    Liu, Zhen
    Yu, Yu
    Zhang, Qiang
    Pan, Jian-Wei
    [J]. NPJ QUANTUM INFORMATION, 2021, 7 (01)
  • [5] Post-quantum cryptography: lattice identification schemes
    Silva, Rosemberg
    Cayrel, Pierre-Louis
    Buchmann, Johannes
    [J]. PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 729 - 748
  • [6] Post-Quantum Group-Oriented Authentication in IoT
    Aleksandrova, E. B.
    Shtyrkina, A. A.
    Yarmak, A., V
    [J]. NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2020, 23 (04): : 405 - 413
  • [7] Post-Quantum Authentication in TLS 1.3: A Performance Study
    Sikeridis, Dimitrios
    Kampanakis, Panos
    Devetsikiotis, Michael
    [J]. 27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [8] On the Suitability of Post-Quantum Signature Schemes for Internet of Things
    Shim, Kyung-Ah
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10648 - 10665
  • [9] Post-quantum signature schemes for efficient hardware implementation
    Moldovyan, Dmitriy N.
    Moldovyan, Alexandr A.
    Moldovyan, Nikolay A.
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2021, 80
  • [10] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104