A survey on NIST PQ signatures

07/23/2021
by   Nicola Di Chiano, et al.
0

Shor's shockingly fast quantum algorithm for solving the period-finding problem is a threat for the most common public-key primitives, as it can be efficiently applied to solve both the Integer Factorisation Problem and the Discrete Logarithm Problem. In other words, many once-secure protocols have to be replaced by still-secure alternatives. Instead of relying, for example, on the RSA protocol, the Diffie-Hellman key-exchange or the (Elliptic Curve) Digital Signature Algorithm, many researchers moved their attention to the design and analysis of primitives which are yet to be broken by quantum algorithms. The urgency of the threat imposed by quantum computers led the U.S. National Institute of Standards and Technology (NIST) to open calls for both Post-Quantum Public-Keys Exchange Algorithms and Post-Quantum Digital Signature Algorithms. In this brief survey we focus on the round 3 finalists and alternate candidates for Digital Signatures: CRYSTALS-DILITHIUM, FALCON, Rainbow, SPHINCS+, GeMSS, Picnic.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/09/2019

Post-Quantum Cryptographic Hardware Primitives

The development and implementation of post-quantum cryptosystems have be...
research
09/25/2020

Signing Information in the Quantum Era

Signatures are primarily used as a mark of authenticity, to demonstrate ...
research
12/30/2022

FIPS Compliant Quantum Secure Communication using Quantum Permutation Pad

Quantum computing has entered fast development track since Shor's algori...
research
10/13/2020

PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks

Hyperledger Fabric is a prominent and flexible solution for building per...
research
05/27/2020

A post-quantum key exchange protocol from the intersection of quadric surfaces

In this paper we present a key exchange protocol in which Alice and Bob ...
research
04/29/2022

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

The evolution of quantum computers poses a serious threat to contemporar...
research
09/13/2018

Pre- and post-quantum Diffie-Hellman from groups, actions, and isogenies

Diffie-Hellman key exchange is at the foundations of public-key cryptogr...

Please sign up or login with your details

Forgot password? Click here to reset