TU Darmstadt / ULB / TUbiblio

Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix
eds.: Sako, Kazue ; Schneider, Steve A. ; Ryan, Peter Y. A. (2019)
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
24th European Symposium on Research in Computer Security. Luxembourg (23.-27.09.2019)
doi: 10.1007/978-3-030-29962-0_25
Conference or Workshop Item, Bibliographie

Abstract

Broken cryptographic algorithms and hardness assumptions are a constant threat to real-world protocols. Prominent examples are hash functions for which collisions become known, or number-theoretic assumptions which are threatened by advances in quantum computing. Especially when it comes to key exchange protocols, the switch to quantum-resistant primitives has begun and aims to protect today's secrets against future developments, moving from common Diffie--Hellman-based solutions to Learning-With-Errors-based approaches, often via intermediate hybrid designs.

Item Type: Conference or Workshop Item
Erschienen: 2019
Editors: Sako, Kazue ; Schneider, Steve A. ; Ryan, Peter Y. A.
Creators: Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix
Type of entry: Bibliographie
Title: Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
Language: English
Date: September 2019
Publisher: Springer
Book Title: ESORICS 2019: Computer Security - ESORICS 2019
Series: Lecture Notes in Computer Science
Series Volume: 11736
Event Title: 24th European Symposium on Research in Computer Security
Event Location: Luxembourg
Event Dates: 23.-27.09.2019
DOI: 10.1007/978-3-030-29962-0_25
Corresponding Links:
Abstract:

Broken cryptographic algorithms and hardness assumptions are a constant threat to real-world protocols. Prominent examples are hash functions for which collisions become known, or number-theoretic assumptions which are threatened by advances in quantum computing. Especially when it comes to key exchange protocols, the switch to quantum-resistant primitives has begun and aims to protect today's secrets against future developments, moving from common Diffie--Hellman-based solutions to Learning-With-Errors-based approaches, often via intermediate hybrid designs.

Uncontrolled Keywords: Solutions, S4
Additional Information:

Proceedings, Part II

Divisions: 20 Department of Computer Science
20 Department of Computer Science > Cryptography and Complexity Theory
DFG-Collaborative Research Centres (incl. Transregio)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres
DFG-Graduiertenkollegs
DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CRISP - Center for Research in Security and Privacy
Forschungsfelder
Forschungsfelder > Information and Intelligence
Forschungsfelder > Information and Intelligence > Cybersecurity & Privacy
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments
Date Deposited: 11 Jul 2019 15:27
Last Modified: 11 Apr 2024 11:23
PPN:
Corresponding Links:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details