MAster assignment
Post-Quantum Cryptography: Exploring New Paradigms for Secure Communication in the Quantum Era
TYPE : MASTER CS
Period: Start date: as soon as possible
Student: Unassigned
If you are interested please contact:
Abstract:
This master's thesis aims to explore post-quantum cryptography, a hot-topic in the field of cryptography that addresses the security challenges posed by quantum computers. The research will involve studying the impact of quantum computing on existing cryptographic algorithms and investigating new paradigms and approaches for secure communication in the quantum era. The objective is to propose and evaluate post-quantum cryptographic schemes that offer robust security while considering their practicality and efficiency. The study will contribute to the development of cryptographic solutions that can withstand attacks from both classical and quantum adversaries.
Objective:
- The primary objective of this research is to explore post-quantum cryptography and propose secure and efficient cryptographic schemes for secure communication in the quantum era. The specific objectives include:
- Understanding the fundamentals of quantum computing and its implications for cryptography.
- Analyzing the vulnerabilities of existing cryptographic algorithms to attacks from quantum computers.
- Investigating new paradigms and approaches in post-quantum cryptography, such as lattice-based, code-based, or multivariate cryptographic schemes.
- Designing and evaluating post-quantum cryptographic schemes in terms of security, efficiency, and practicality.
- Exploring potential deployment scenarios and assessing the interoperability of post-quantum cryptographic schemes with existing cryptographic infrastructure.
Methodology:
- Literature Review: Conduct an extensive review of literature and research papers on quantum computing, post-quantum cryptography, quantum-resistant algorithms, and the vulnerabilities of existing cryptographic schemes to quantum attacks. Identify key research gaps and areas for exploration.
- Analysis of Existing Cryptographic Algorithms: Study the vulnerabilities of widely used cryptographic algorithms, such as RSA, ECC, and symmetric encryption algorithms, to attacks from quantum computers. Understand the impact of quantum computing on their security assumptions and evaluate the urgency for post-quantum cryptographic solutions.
- Post-Quantum Cryptographic Schemes: Explore new paradigms and approaches in post-quantum cryptography, such as lattice-based, code-based, or multivariate cryptographic schemes. Understand their underlying mathematics and security assumptions. Analyze their resistance to quantum attacks and assess their suitability for practical deployment.
- Scheme Design and Evaluation: Design and implement post-quantum cryptographic schemes that offer robust security against both classical and quantum adversaries. Evaluate their security, efficiency, and practicality in terms of factors such as computational overhead, key size, and performance. Conduct extensive testing and analysis to measure their resistance against known attacks.
- Interoperability and Deployment Considerations: Investigate the interoperability of post-quantum cryptographic schemes with existing cryptographic infrastructure and protocols. Analyze potential deployment scenarios, such as secure communication protocols, digital signatures, or key exchange mechanisms. Assess the practical feasibility and integration challenges of post-quantum cryptographic schemes in real-world applications.
- Comparative Analysis and Evaluation: Compare the performance, security, and practicality of the proposed post-quantum cryptographic schemes with existing cryptographic algorithms. Assess their advantages, limitations, and potential trade-offs. Provide insights into the potential adoption and migration strategies for post-quantum cryptography in various domains.
Expected Outcome:
The expected outcome of this research is a comprehensive understanding of post-quantum cryptography and the proposal of secure and efficient cryptographic schemes for secure communication in the quantum era. The thesis will contribute to the development of cryptographic solutions that can withstand attacks from both classical and quantum adversaries. The findings will aid in the transition towards post-quantum cryptography, ensuring the long-term security of sensitive information in an era of quantum computers.
References:
- Bernstein, D. J., Lange, T., & Peters, C. (2017). Post-Quantum Cryptography. Nature, 549(7671), 188-195. DOI: 10.1038/nature23461
- Alagic, G., Mosca, M., & Lutomirski, P. (2020). Post-Quantum Cryptography Standardization. Nature Electronics, 3(1), 16-18. DOI: 10.1038/s41928-019-0346-4
- Peikert, C. (2016). A Decade of Lattice Cryptography. Foundations and Trends in Theoretical Computer Science, 10(4), 283-424. DOI: 10.1561/0400000079
- Pöppelmann, T., & Schwabe, P. (2020). Classic McEliece: New Options for a Post-Quantum World. In International Workshop on Post-Quantum Cryptography (pp. 3-24). Springer. DOI: 10.1007/978-3-030-36574-2_1
Detailed Methodology:
Scheme Design and Evaluation
In the context of post-quantum cryptographic schemes, you can follow the following detailed steps:
1. Understand Post-Quantum Cryptography:
- Study the principles and concepts of post-quantum cryptography, which aims to develop cryptographic schemes resistant to attacks by both classical and quantum computers.
- Familiarize yourself with the different families of post-quantum cryptographic algorithms, such as lattice-based, code-based, multivariate polynomial-based, and hash-based algorithms.
2. Select Cryptographic Schemes:
- Identify a set of post-quantum cryptographic schemes from different families that have gained attention in recent research literature.
- Evaluate the security properties, efficiency characteristics, and practicality of the selected schemes.
- Consider factors such as resistance against quantum algorithms, key sizes, computational complexity, and compatibility with existing cryptographic infrastructure.
3. Design and Implementation:
- Design the chosen post-quantum cryptographic schemes based on their specifications and mathematical foundations.
- Implement the cryptographic schemes using a suitable programming language or cryptographic libraries.
- Ensure that the implementation adheres to the specifications and guidelines provided in the research literature.
4. Security Evaluation:
- Conduct a comprehensive security evaluation of the implemented post-quantum cryptographic schemes.
- Analyze the resistance of the schemes against known attacks, including classical attacks and potential quantum attacks.
- Evaluate the cryptographic schemes' security parameters, such as the hardness of underlying mathematical problems or assumptions.
5. Efficiency and Performance Analysis:
- Measure the efficiency and performance characteristics of the implemented post-quantum cryptographic schemes.
- Evaluate factors such as computational overhead, memory requirements, key sizes, and encryption/decryption speeds.
- Compare the performance of the schemes with traditional cryptographic algorithms, considering the impact of post-quantum security requirements.
6. Testing and Analysis:
- Conduct extensive testing of the implemented cryptographic schemes under various scenarios and inputs.
- Verify the correctness and functionality of the schemes.
- Perform thorough analysis to identify any vulnerabilities, weaknesses, or potential improvements in the schemes.
7. Comparison and Evaluation:
- Compare the security, efficiency, and practicality of the implemented post-quantum cryptographic schemes.
- Consider the trade-offs between security and performance in the evaluation process.
- Analyze the results obtained from the security evaluation, efficiency analysis, and testing to draw conclusions about the strengths and weaknesses of the schemes.
8. Documentation and Reporting:
- Document the design, implementation details, evaluation methodology, and analysis results of the post-quantum cryptographic schemes.
- Prepare a comprehensive report summarizing the findings, including the security evaluation, efficiency analysis, and comparisons with existing cryptographic schemes.
- Clearly present the strengths, limitations, and potential areas for future research or improvement in the post-quantum cryptographic schemes.
By following these steps, you can design and evaluate post-quantum cryptographic schemes, considering factors such as security, efficiency, and practicality.