Dustin Moody Post Quantum Cryptography Team National Institute of Standards and Technology (NIST)
Dustin Moody Post Quantum Cryptography Team National Institute of Standards and Technology (NIST)
Dustin Moody Post Quantum Cryptography Team National Institute of Standards and Technology (NIST)
Impact:
◦ Public key crypto: FIPS 186-4, SP 800-56A/56B
RSA
Elliptic Curve Cryptography (ECDSA)
Finite Field Cryptography (DSA)
Diffie-Hellman key exchange
AES
Triple DES
Impact:
◦ Public key crypto:
RSA
Elliptic Curve Cryptography (ECDSA)
Finite Field Cryptography (DSA)
Diffie-Hellman key exchange
◦ Hash functions:
SHA-1, SHA-2 and SHA-3 Use longer output
How long does encryption need to be secure (x years)
How long to re-tool existing infrastructure with quantum safe
solution (y years)
How long until large-scale quantum computer is built (z years)
y x
z
secret keys revealed
time
Workshops
◦ Early 2018 – submitter’s presentations
◦ One or two during the analysis phase
Post-quantum cryptography is more complicated
than AES or SHA-3
◦ No silver bullet - each candidate has some disadvantage
◦ Not enough research on quantum algorithms to ensure
confidence for some schemes
Security proofs
Memory requirements
◦ Concrete parameter sets and key sizes for target
security levels
◦ Ciphertext/signature size
Ease of implementation
◦ Tunable parameters
◦ Implementable on wide variety of platforms and
applications
◦ Parallelizable
◦ Resistance to side-channel attacks
Ease of use
◦ How does it fit in existing protocols (such as TLS or IKE)
◦ Misuse resistance
Simplicity
How is the timeline? Too fast? Too slow?
◦ Do we need an ongoing process, or is one time enough?