Page 51

PQC_for_Dummies

CHAPTER 5 Hardware Security Modules 51 Web Resources If you would like to have further information about this topic, here are some places to start: ✔ The Utimaco HSM website: https://hsm.utimaco.com/ ✔ Fraunhofer SIT PQC homepage: https://www.sit.fraunhofer.de/en/ pqcryptography/ ✔ Microsoft PICNIC project page: https://microsoft.github.io/Picnic/ ✔ NIST PQC project page: https://csrc.nist.gov/Projects/Post- Quantum-Cryptography Five Things to Keep in Mind about HSMs We would like to wrap up this booklet with some practical advice. Hardware security modules (HSMs) play an instrumental role in implementing a cryptographic solution that remains secure in the age of quantum computing. This is true regardless of whether symmetric or novel post-quantum crypto (PQC) algorithms are used. Here are some criteria you may want to take into account when evaluating HSMs for your system. An SDK is a must-have Solutions relying on symmetric cryptography for authentication are typically based on custom functions such as A3() and A8() in the GSM example or on custom routines to implement Kerberos-like protocols. The code needs to be executed inside the HSM, as secret keys must not be exported. The HSM needs to come with an easy-to-use software development kit (SDK). The SDK should allow for designing and implementing arbitrary commands. Putting the developer in a straitjacket — for instance, by trying to force-fit


PQC_for_Dummies
To see the actual publication please follow the link above