Page 21

PQC_for_Dummies

CHAPTER 2 Challenges Ahead 21 Implementation Efficient implementations Despite ongoing efforts to reduce the resource requirements of post-quantum schemes, highly optimized implementations of post-quantum schemes will be required. In particular embedded and passively powered devices require efficient hardware implementations in order to reduce power demand and computation time. Nevertheless, some low-cost or legacy devices will not provide a sufficient amount of resources for post-quantum cryptography and investments in more powerful hardware will be required. Secure implementations Implementing post-quantum algorithms in a secure manner poses new challenges. Side-channel cryptanalysis, fault injection attacks, and physical cryptanalysis have become powerful threats to classical cryptographic implementations. Similar attacks need to be considered for the implementation of post-quantum schemes. Post-quantum schemes might expose further attack vectors that need to be anticipated and secured. This research requires experts for both post-quantum cryptography and hardware security. Migration Existing systems need to be migrated to post-quantum security. Therefore, software implementations require secure update mechanisms. Fixed hardware implementations e.g., smart cards or security tokens will need to be replaced. During the transition time, while the security of post-quantum schemes has not yet been fully verified, a hybrid approach using both classical and post-quantum cryptography will be required: By using both classical and post-quantum schemes together, one can achieve high security even in case the post-quantum scheme might turn out to be insecure.


PQC_for_Dummies
To see the actual publication please follow the link above