Applying a cryptographic metric to post-quantum lattice-based signature algorithms |
|
Author: | Rautell, Markus1; Latvala, Outi-Marja1; Vallivaara, Visa1; |
Organizations: |
1VTT Technical Research Centre of Finland, Oulu, Finland 2University of Oulu and National Defence University of Finland, Oulu, Finland |
Format: | article |
Version: | published version |
Access: | open |
Online Access: | PDF Full Text (PDF, 0.5 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe2022092059666 |
Language: | English |
Published: |
Association for Computing Machinery,
2022
|
Publish Date: | 2022-09-20 |
Description: |
AbstractMeasuring the security of cryptographic systems is not a simple task. Nevertheless, there is an increasing need for a cryptographic metric which could assist in decision making when choosing between various candidates. The National Institute of Standards and Technology (NIST) has launched a process to standardize quantum-resistance public key encryption, key encapsulation and digital signature algorithms. This is NIST’s response to the threat posed by quantum computers against classical public key cryptography. In this paper, we apply a metric taxonomy, produced by earlier studies, to two NIST third round finalist digital signature algorithms Dilithium and Falcon in order to asses the effectiveness and extensiveness of the metric. Although, our results show that clear differences can be found with used metrics, we propose some improvements to them to allow more comprehensive analysis. see all
|
ISBN Print: | 978-1-4503-9670-7 |
Article number: | 87 |
DOI: | 10.1145/3538969.3544438 |
OADOI: | https://oadoi.org/10.1145/3538969.3544438 |
Host publication: |
ARES 2022 : proceedings of the 17th International Conference on Availability, Reliability and Security, August 23-26 2022, Vienna, Austria |
Conference: |
International Conference on Availability, Reliability and Security |
Type of Publication: |
A4 Article in conference proceedings |
Field of Science: |
113 Computer and information sciences |
Subjects: | |
Funding: |
This work has been conducted in the Post Quantum Cryptograpy Finland project, which has received funding from Business Finland. |
Copyright information: |
© 2022 Copyright held by the owner/author(s). Publication rights licensed to ACM. |