Post-Quantum Cryptography Standardization
Post-Quantum Cryptography Standardization is a project by NIST to standardize post-quantum cryptography.[1] 23 signature schemes were submitted, 59 encryption/KEM schemes were submitted[2] by the initial submission deadline at the end of 2017, of which 69 total were deemed complete and proper.
Under consideration are:[3]
Type | PKE/KEM | Signature | Signature & PKE/KEM |
---|---|---|---|
Lattice |
|
|
|
Code-based |
|
|
|
Hash-based |
|
||
Multivariate |
|
|
|
Braid group |
|
||
Supersingular Elliptic Curve Isogeny |
|
||
Satirical submission |
| ||
Other |
|
|
Round 1 submissions published attacks
- Guess Again by Lorenz Panny [6]
- RVB by Lorenz Panny[7]
- RaCoSS by Daniel J. Bernstein, Andreas Hülsing, Tanja Lange and Lorenz Panny[8]
- HK17 by Daniel J. Bernstein and Tanja Lange[9]
- SRTPI by Bo-Yin Yang[10]
- WalnutDSA
- DRS by Yang Yu and Léo Ducas [13]
- DAGS by Elise Barelli and Alain Couvreur[14]
- RLCE by Alain Couvreur, Matthieu Lequesne, and Jean-Pierre Tillich[15]
- Hila5 by Daniel J. Bernstein, Leon Groot Bruinderink, Tania Lange and Lorenz Panny[16]
- Giophantus by Ward Beullens, Wouter Castryck and Frederik Vercauteren[17]
References
- ↑ https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization
- ↑ https://post-quantum.ch/
- ↑ https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions
- 1 2 https://www.onboardsecurity.com/nist-post-quantum-crypto-submission
- ↑ https://groups.google.com/a/list.nist.gov/forum/#!topic/pqc-forum/YsGkKEJTt5c
- ↑ https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/guess-again-official-comment.pdf
- ↑ https://twitter.com/yx7__/status/945283780851400704
- ↑ https://helaas.org/racoss/
- ↑ https://helaas.org/hk17/
- ↑ https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/SRTPI-official-comment.pdf
- ↑ Beullens, Ward; Blackburn, Simon R. (2018). "Practical attacks against the Walnut digital signature scheme".
- ↑ Kotov, Matvei; Menshov, Anton; Ushakov, Alexander (2018). "AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM".
- ↑ Yu, Yang; Ducas, Léo (2018). "Learning strikes again: the case of the DRS signature scheme".
- ↑ Barelli, Elise; Couvreur, Alain (2018). "An efficient structural attack on NIST submission DAGS". arXiv:1805.05429 [cs.CR].
- ↑ Couvreur, Alain; Lequesne, Matthieu; Tillich, Jean-Pierre (2018). "Recovering short secret keys of RLCE in polynomial time". arXiv:1805.11489 [cs.CR].
- ↑ Bernstein, Daniel J.; Groot Bruinderink, Leon; Lange, Tanja; Lange, Lorenz (2017). "Hila5 Pindakaas: On the CCA security of lattice-based encryption with error correction".
- ↑ "Official Comments" (PDF). csrc.nist.gov. 13 September 2018.
External links
This article is issued from
Wikipedia.
The text is licensed under Creative Commons - Attribution - Sharealike.
Additional terms may apply for the media files.