Implementing Post-quantum Cryptography for Developers

Julius Hekkala, Kimmo Halunen, Kimmo Halunen, Visa Vallivaara

2022

Abstract

The possibility of a quantum computer threatens modern public key cryptography. Post-quantum cryptographic algorithms are designed to protect sensitive data and communications also against an attacker equipped with a quantum computer. National Institute of Standards and Technology is standardizing post-quantum algorithms that could replace currently used public key cryptographic algorithms in key exchange and digital signatures. Lattice-based cryptography is one of the post-quantum algorithm groups with the biggest potential. Cryptography libraries are used by developers in all kinds of different solutions, but currently the availability of post-quantum algorithms in open-source libraries is very limited. Implementing post-quantum algorithms into a software library involves a multitude of challenges. We integrated three lattice-based post-quantum algorithms into a fork of Crypto++, a C++ cryptography library. We analyzed challenges in the implementation process and the performance and security of the fork. Especially the complex mathematical ideas behind the algorithms make implementation difficult. The performance of the algorithms was satisfactory but analyzing the security of the implementation in more detail is needed.

Download


Paper Citation


in Harvard Style

Hekkala J., Halunen K. and Vallivaara V. (2022). Implementing Post-quantum Cryptography for Developers. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-553-1, pages 73-83. DOI: 10.5220/0010786200003120


in Bibtex Style

@conference{icissp22,
author={Julius Hekkala and Kimmo Halunen and Visa Vallivaara},
title={Implementing Post-quantum Cryptography for Developers},
booktitle={Proceedings of the 8th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2022},
pages={73-83},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010786200003120},
isbn={978-989-758-553-1},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 8th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Implementing Post-quantum Cryptography for Developers
SN - 978-989-758-553-1
AU - Hekkala J.
AU - Halunen K.
AU - Vallivaara V.
PY - 2022
SP - 73
EP - 83
DO - 10.5220/0010786200003120