Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Programme Category

Article available in the following languages:

EN

Integration of Post-Quantum Cryptography (PQC) algorithms into high-level protocols

 

The transition to post-quantum cryptography requires changing the uses of most currently deployed public-key cryptography (RSA and ECC). Research and development efforts are providing signature systems and key-exchange mechanisms that are generally accepted to withstand attacks using classical and quantum computers. Efforts are on the way to include these in core Internet protocols such as Transport Layer Security (TLS). While this is an important development, many more protocols need to be modified to be quantum-ready and to ensure backward compatibility with legacy systems. Various application areas, such as Internet of Things, cloud-based applications, and automotive, place constraints on bandwidth or processing time which may prompt different choices than those employed for TLS. Currently used high-level protocols may have components that are specific to Elliptic Curve Cryptography (ECC) or to Rivest-Shamir-Adleman (RSA) or may require additional building blocks next to or in place of signatures and key-exchange mechanisms. While applications that provide authenticity are less urgent to migrate than those for confidentiality, those using embedded hardware such as secure elements, Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA) using hardware tokens and others have a very slow turnover and need to be replaced by the time large quantum computers exist, thus requiring migrating the design in the near future.

Activities should target one or multiple relevant high-level protocols and produce their post-quantum versions. Typically, this can be achieved through combining current and post-quantum solutions for backward compatibility. Atypical solutions with equivalent security are also welcome. Consortia composed by actors of different nature, such as, for example, research institutions, relevant public entities, and industry to ensure that PQC solutions meet real-world security demands and are robustly tested across various applications are also welcome.

Il mio fascicolo 0 0