Affiliation:
1. Department of Computer Science and Digital Technologies, Grambling State University 1 , Grambling, Louisiana 21245, USA
2. Naval Information Warfare Center—Atlantic 2 , North Charleston, South Carolina 29419, USA
Abstract
Large quantum computers have the potential to break many cryptographic systems, e.g., Rivest–Shamir–Adleman, Diffie–Hellman key exchange, and the elliptical curve cryptosystem. The Department of Defense (DoD) is aware of this threat, and the National Institute of Standards and Technology is preparing a set of approved encryption and signature schemes that are not susceptible to these attacks by quantum computers, the so-called Post-Quantum Cryptography (PQC). The task of substituting older encryption and signature schemes raises a number of questions, to which there are not yet clear answers. In this research, we investigate the transition to PQC on existing networks, explain the approved PQC schemes, describe the likely path to an adaptation of PQC, and offer forward guidance on challenges and threats that may be encountered in the process of transition to PQC. This paper discusses the impacts of the new PQC schemes on network performance and speculates on possible side-channel attacks on the new encryption scheme. This paper offers hardware/software solutions based on the Split-protocol.
Reference59 articles.
1. Goppa codes and their use in the McEliece cryptosystems,2015
2. Post-Quantum Cryptography, CSRC, 2017, https://csrc.nist.gov/projects/post-quantum-cryptography.
3. Cognitive analytics and comparison of symmetric and asymmetric cryptography algorithms;Int. J. Adv. Res. Comput. Sci.,2015
4. Quantum gate verification and its application in property testing;Phys. Rev. Res.,2020