Location

https://www.kennesaw.edu/ccse/events/computing-showcase/sp24-cday-program.php

Streaming Media

Document Type

Event

Start Date

25-4-2024 4:00 PM

Description

Within the next twenty years or so experts predict that we will have quantum computers which will make certain kinds of encryption that we rely on ineffective and vulnerable to malicious entities. Post quantum computing (PQC) algorithms fill in that security gap that classical encryption algorithms can not. A particular category of PQC algorithms are key exchange mechanism (KEM) algorithm. The goal of these algorithms is to securely generate a shared symmetric key which can be used for encrypting future communication between the hosts. An important use case for these algorithms is in securing the Transport Layer Security protocol (TLS) against quantum adversaries. Due to the widespread use of TLS, it is critical that any new standard use PQC algorithms which are both efficient and secure. To this end we test each of the PQC KEM algorithms provided by oqs-provider library to compare their performance impact on the TLS handshake.

Share

COinS
 
Apr 25th, 4:00 PM

UR-89 Performance Analysis of Post-Quantum Computing Key Encapsulation Mechanism Algorithms

https://www.kennesaw.edu/ccse/events/computing-showcase/sp24-cday-program.php

Within the next twenty years or so experts predict that we will have quantum computers which will make certain kinds of encryption that we rely on ineffective and vulnerable to malicious entities. Post quantum computing (PQC) algorithms fill in that security gap that classical encryption algorithms can not. A particular category of PQC algorithms are key exchange mechanism (KEM) algorithm. The goal of these algorithms is to securely generate a shared symmetric key which can be used for encrypting future communication between the hosts. An important use case for these algorithms is in securing the Transport Layer Security protocol (TLS) against quantum adversaries. Due to the widespread use of TLS, it is critical that any new standard use PQC algorithms which are both efficient and secure. To this end we test each of the PQC KEM algorithms provided by oqs-provider library to compare their performance impact on the TLS handshake.