c02

PQC_for_Dummies

IN THIS CHAPTER Analysis: Trust, metrics, parameters, and efficient schemes ................................................................................................................................................ Implementation: Efficient and secure implementations, migration, and agility ................................................................................................................................................ Caveats: Compatibility, education, standardization, legislation, and regulation ................................................................................................................................................ Chapter 2 Challenges Ahead There is a number of challenges that need to be solved in order to enable post-quantum cryptography for practical application: Analysis Trust Traditionally, trust in cryptographic schemes has grown over time: The longer no crucial attacks have been found against a scheme, the more a scheme is trusted. Some post-quantum schemes have been around for a while, are well trusted, and considered sufficiently mature for deployment. Other schemes are fairly young. If we want to deploy recently developed post-quantum schemes within the next five to ten years, we do not have time to »age« their trust. Instead, newly invented cryptographic schemes require thorough security analysis and security proofs that inspire trust without a long waiting period. Metrics The security metric for cryptographic schemes in respect to classical attacks is relatively well understood: the security parameters must be chosen such that the best known attack has a cost well above a certain computational threshold. However, neither the cost of the best known attack nor the threshold are fixed. Better


PQC_for_Dummies
To see the actual publication please follow the link above