词条 | Post-Quantum Cryptography Standardization | |||||||||||||||||||||
释义 |
Post-Quantum Cryptography Standardization is a project by NIST to standardize post-quantum cryptography.[1] 23 signature schemes were submitted, 59 encryption/KEM schemes were submitted[2] by the initial submission deadline at the end of 2017, of which 69 total were deemed complete and proper and participated in the first round. 26 of these have advanced to the second round (17 encryption/key-establishment and 9 signature schemes). Round TwoCandidates moving on to the second round were announced on January 30, 2019. They are:[3]
Round OneUnder consideration were:[25] (
Round One submissions published attacks
See also
References1. ^{{cite web|url=https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization|title=Post-Quantum Cryptography Standardization - Post-Quantum Cryptography |date=3 January 2017|website=Csrc.nist.gov|accessdate=31 January 2019}} 2. ^{{Cite web |url=https://post-quantum.ch/# |title=Archived copy |access-date=2017-12-29 |archive-url=https://web.archive.org/web/20171229232437/https://post-quantum.ch/# |archive-date=2017-12-29 |dead-url=yes |df= }} 3. ^{{cite web|url=https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions|title=Round 2 Submissions - Post-Quantum Cryptography - CSRC|first=Information Technology Laboratory|last=Computer Security Division|date=3 January 2017|website=Csrc.nist.gov|accessdate=31 January 2019}} 4. ^1 {{cite web|url=https://pq-crystals.org/|title=CRYSTALS|first=Peter|last=Schwabe|website=Pq-crystals.org|accessdate=31 January 2019}} 5. ^{{cite web|url=https://frodokem.org/|title=FrodoKEM|website=Frodokem.org|accessdate=31 January 2019}} 6. ^{{cite web|url=https://newhopecrypto.org/|title=NewHope|first=Peter|last=Schwabe|website=Newhopecrypto.org|accessdate=31 January 2019}} 7. ^1 2 [https://www.onboardsecurity.com/nist-post-quantum-crypto-submission] {{dead link|date=January 2019}} 8. ^[https://ntruprime.cr.yp.to/] {{dead link|date=January 2019}} 9. ^1 {{cite web|url=https://groups.google.com/a/list.nist.gov/forum/#!topic/pqc-forum/YsGkKEJTt5c|title=Google Groups|website=Groups.google.com|accessdate=31 January 2019}} 10. ^{{cite web|url=https://sourceforge.net/projects/threebears/|title=ThreeBears|website=SourceForge.net|accessdate=31 January 2019}} 11. ^{{cite web|url=https://falcon-sign.info/|title=Falcon|website=Falcon-sign.info|accessdate=31 January 2019}} 12. ^{{cite web|url=https://qtesla.org/|title=qTESLA – Efficient and post-quantum secure lattice-based signature scheme|accessdate=31 January 2019}} 13. ^{{cite web|url=https://bikesuite.org/|title=BIKE - Bit Flipping Key Encapsulation|website=Bikesuite.org|accessdate=31 January 2019}} 14. ^{{cite web|url=http://pqc-hqc.org/|title=HQC|website=Pqc-hqc.org|accessdate=31 January 2019}} 15. ^{{cite web|url=https://www.ledacrypt.org/LEDAkem/|title=LEDAkem Key Encapsulation Module|website=Ledacrypt.org|accessdate=31 January 2019}} 16. ^{{cite web|url=https://www.ledacrypt.org/LEDApkc/|title=LEDApkc Public Key Cryptosystem|website=Ledacrypt.org|accessdate=31 January 2019}} 17. ^[https://nts-kem.io/] {{dead link|date=January 2019}} 18. ^1 {{cite web|url=http://www.pqc-rollo.org/|title=ROLLO|website=Pqc-rollo.org|accessdate=31 January 2019}} 19. ^{{cite web|url=http://pqc-rqc.org/|title=RQC|website=Pqc-rqc.org|accessdate=31 January 2019}} 20. ^[https://sphincs.org/] {{dead link|date=January 2019}} 21. ^[https://www-polsys.lip6.fr/Links/NIST/GeMSS.html] {{dead link|date=January 2019}} 22. ^{{cite web|url=http://mqdss.org/|title=MQDSS post-quantum signature|website=Mqdss.org|accessdate=31 January 2019}} 23. ^{{cite web|url=http://sike.org/|title=SIKE – Supersingular Isogeny Key Encapsulation|website=Sike.org|accessdate=31 January 2019}} 24. ^{{cite web|url=https://microsoft.github.io/Picnic/|title=Picnic. A Family of Post-Quantum Secure Digital Signature Algorithms|website=microsoft.github.io|accessdate=26 February 2019}} 25. ^{{cite web|url=https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions|title=Round 1 Submissions - Post-Quantum Cryptography - CSRC|first=Information Technology Laboratory|last=Computer Security Division|date=3 January 2017|website=Csrc.nist.gov|accessdate=31 January 2019}} 26. ^{{cite web|url=https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/guess-again-official-comment.pdf|title=Dear all, the following Python script quickly recovers the message from a given "Guess Again" ciphertext without knowledge of the private key|website=Csrc.nist.gov|accessdate=30 January 2019}} 27. ^{{cite web|url=https://twitter.com/yx7__/status/945283780851400704|title=Fast key recovery attack against the "RVB" submission to #NISTPQC: t …. Computes private from public key.|first=Lorenz|last=Panny|date=25 December 2017|publisher=Twitter|accessdate=31 January 2019}} 28. ^[https://helaas.org/racoss/] {{dead link|date=January 2019}} 29. ^[https://helaas.org/hk17/] {{dead link|date=January 2019}} 30. ^{{cite web|url=https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/SRTPI-official-comment.pdf|title=Dear all, We have broken SRTPI under CPA and TPSig under KMA.|website=Csrc.nist.gov|accessdate=30 January 2019}} 31. ^{{Cite journal|last=Beullens|first=Ward|last2=Blackburn|first2=Simon R.|date=2018|title=Practical attacks against the Walnut digital signature scheme|url=https://eprint.iacr.org/2018/318|website=Eprint.iacr.org}} 32. ^{{Cite journal|last=Kotov|first=Matvei |last2=Menshov |first2=Anton|first3=Alexander|last3= Ushakov |date=2018|title= AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM|url=https://eprint.iacr.org/2018/393|website=Eprint.iacr.org}} 33. ^{{Cite journal|last1=Yu|first1=Yang|last2=Ducas |first2=Léo |date=2018|title= Learning strikes again: the case of the DRS signature scheme|url=https://eprint.iacr.org/2018/294|website=Eprint.iacr.org}} 34. ^{{cite arxiv|last1=Barelli |first1=Elise |last2=Couvreur|first2=Alain |date=2018|title= An efficient structural attack on NIST submission DAGS|eprint=1805.05429|class=cs.CR }} 35. ^{{cite arxiv|last1=Lequesne |first1=Matthieu |last2=Tillich|first2=Jean-Pierre |date=2018|title= Attack on the Edon-K Key Encapsulation Mechanism|eprint=1802.06157|class=cs.CR }} 36. ^{{cite arxiv|last1=Couvreur|first1=Alain |last2=Lequesne|first2=Matthieu |last3=Tillich|first3=Jean-Pierre|date=2018|title= Recovering short secret keys of RLCE in polynomial time|eprint=1805.11489|class=cs.CR }} 37. ^{{cite journal|title=Hila5 Pindakaas: On the CCA security of lattice-based encryption with error correction|last1=Bernstein|first1=Daniel J.|last2=Groot Bruinderink|first2=Leon|first3=Tanja|last3=Lange|first4=Lorenz|last4=Lange|date=2017|url=https://eprint.iacr.org/2017/1214}} 38. ^{{Cite web|url=https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/Giophantus-official-comment.pdf|title=Official Comments|date=13 September 2018|website=Csrc.nist.gov}} 39. ^{{cite arXiv|title=Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme|eprint = 1804.02556|last1 = Barelli|first1 = Elise|last2 = Couvreur|first2 = Alain|class = cs.CR|year = 2018}} 40. ^{{cite web|url=https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/McNie-official-comment.pdf|title=I am afraid the parameters in this proposal have at most 4 to 6‐bits security under the Information Set Decoding (ISD) attack.|website=Csrc.nist.gov|accessdate=30 January 2019}} 41. ^{{cite book|chapter=Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation|first1=Terry Shue Chien|title = Advances in Information and Computer Security|volume = 11049|last1=Lau|first2=Chik How|last2=Tan|editor-first1=Atsuo|editor-last1=Inomata|editor-first2=Kan|editor-last2=Yasuda|date=31 January 2019|publisher=Springer International Publishing|pages=19–34|doi=10.1007/978-3-319-97916-8_2|series = Lecture Notes in Computer Science|isbn = 978-3-319-97915-1}} External links
3 : Cryptography standards|Cryptography contests|Post-quantum cryptography |
|||||||||||||||||||||
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。