Implementing post-quantum KEMs: Practical challenges and solutions

Vorobets, P. and Vakhula, O. and Horpenyuk, A. and Korshun, Natalia (2024) Implementing post-quantum KEMs: Practical challenges and solutions Cybersecurity Providing in Information and Telecommunication Systems II 2024, 3826. pp. 212-219. ISSN 1613-0073

[thumbnail of P_Vorobets_O_Vakhula_A_Horpenyuk_N_Korshun_CPITS_2024_3826.pdf] Text
P_Vorobets_O_Vakhula_A_Horpenyuk_N_Korshun_CPITS_2024_3826.pdf

Download (2MB)

Abstract

The paper provides an overview and analysis of the current state, problems, and prospects of post-quantum key encapsulation mechanisms. The essential cryptographic building blocks for implementing secure communication protocols are key-encapsulation mechanisms. KEMs enable two parties to securely establish a shared secret key over an insecure channel. This shared key can then be used for symmetric encryption of messages, ensuring confidentiality and integrity of the exchanged data. The National Institute of Standards and Technology (NIST) is actively working on standardizing post-quantum cryptography including KEMs. After the third round of the NIST PQC Standardization Process, NIST has identified the CRYSTALS-KYBER KEM algorithm for standardization. The four algorithms selected for a fourth round are BIKE, Classic McEliece, HQC, and SIKE. In this paper, we explore all these algorithms.

Item Type: Article
Uncontrolled Keywords: post-quantum cryptography; KEM; standardization process; NIST; CRYSTALS-KYBER; BIKE; Classic McEliece; HQC; SIKE
Subjects: Статті у базах даних > Scopus
Divisions: Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка
Depositing User: Павло Миколайович Складанний
Date Deposited: 06 Dec 2024 08:24
Last Modified: 06 Dec 2024 08:24
URI: https://elibrary.kubg.edu.ua/id/eprint/50159

Actions (login required)

View Item View Item