Location
https://www.kennesaw.edu/ccse/events/computing-showcase/sp24-cday-program.php
Document Type
Event
Start Date
25-4-2024 4:00 PM
Description
Within the next twenty years or so experts predict that we will have quantum computers which will make certain kinds of encryption that we rely on ineffective and vulnerable to malicious entities. Post quantum computing (PQC) algorithms fill in that security gap that classical encryption algorithms can not. A particular category of PQC algorithms are key exchange mechanism (KEM) algorithm. The goal of these algorithms is to securely generate a shared symmetric key which can be used for encrypting future communication between the hosts. An important use case for these algorithms is in securing the Transport Layer Security protocol (TLS) against quantum adversaries. Due to the widespread use of TLS, it is critical that any new standard use PQC algorithms which are both efficient and secure. To this end we test each of the PQC KEM algorithms provided by oqs-provider library to compare their performance impact on the TLS handshake.
Included in
UR-89 Performance Analysis of Post-Quantum Computing Key Encapsulation Mechanism Algorithms
https://www.kennesaw.edu/ccse/events/computing-showcase/sp24-cday-program.php
Within the next twenty years or so experts predict that we will have quantum computers which will make certain kinds of encryption that we rely on ineffective and vulnerable to malicious entities. Post quantum computing (PQC) algorithms fill in that security gap that classical encryption algorithms can not. A particular category of PQC algorithms are key exchange mechanism (KEM) algorithm. The goal of these algorithms is to securely generate a shared symmetric key which can be used for encrypting future communication between the hosts. An important use case for these algorithms is in securing the Transport Layer Security protocol (TLS) against quantum adversaries. Due to the widespread use of TLS, it is critical that any new standard use PQC algorithms which are both efficient and secure. To this end we test each of the PQC KEM algorithms provided by oqs-provider library to compare their performance impact on the TLS handshake.