On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures
dc.contributor.author | Malina, Lukáš | cs |
dc.contributor.author | Dobiáš, Patrik | cs |
dc.contributor.author | Hajný, Jan | cs |
dc.contributor.author | Choo, Kim-Kwang Raymond | cs |
dc.date.issued | 2023-08-29 | cs |
dc.description.abstract | As quantum-safe algorithms are increasingly implemented in security protocols used in current and emerging digital services, there is also a corresponding need to map the current state of security protocols and applications and their preparedness for the post-quantum era. In this paper, we review current security recommendations, existing security libraries, and the support of Post-Quantum Cryptography (PQC) in widely-used security protocols. We also present a practical assessment of recently selected PQC algorithms by the National Institute of Standards and Technologies (NIST) PQC standardization on typical platforms that can be deployed in intelligent infrastructures (e.g., smartphones and single-boards), and recently recommended hash-based signatures for software/firmware signing. Finally, we discuss how incoming post-quantum migration affects selected areas in intelligent infrastructures. | en |
dc.format | text | cs |
dc.format.extent | 1-10 | cs |
dc.format.mimetype | application/pdf | cs |
dc.identifier.citation | ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security. 2023, p. 1-10. | en |
dc.identifier.doi | 10.1145/3600160.3605038 | cs |
dc.identifier.isbn | 979-8-4007-0772-8 | cs |
dc.identifier.orcid | 0000-0002-7208-2514 | cs |
dc.identifier.orcid | 0000-0002-7321-7003 | cs |
dc.identifier.orcid | 0000-0003-2831-1073 | cs |
dc.identifier.other | 184534 | cs |
dc.identifier.researcherid | E-2174-2018 | cs |
dc.identifier.scopus | 49863792100 | cs |
dc.identifier.scopus | 55504712600 | cs |
dc.identifier.uri | http://hdl.handle.net/11012/245031 | |
dc.language.iso | en | cs |
dc.publisher | Association for Computing Machinery | cs |
dc.relation.ispartof | ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security | cs |
dc.relation.uri | https://dl.acm.org/doi/10.1145/3600160.3605038 | cs |
dc.rights | Creative Commons Attribution 4.0 International | cs |
dc.rights.access | openAccess | cs |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
dc.subject | Applied Cryptography | en |
dc.subject | Assessment | en |
dc.subject | Performance | en |
dc.subject | Post-Quantum Cryptography | en |
dc.subject | Security Protocols | en |
dc.subject | Security Recommendations | en |
dc.title | On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures | en |
dc.type.driver | conferenceObject | en |
dc.type.status | Peer-reviewed | en |
dc.type.version | publishedVersion | en |
eprints.grantNumber | info:eu-repo/grantAgreement/MV0/VJ/VJ03030014 | cs |
sync.item.dbid | VAV-184534 | en |
sync.item.dbtype | VAV | en |
sync.item.insts | 2025.02.03 15:42:36 | en |
sync.item.modts | 2025.01.17 15:12:38 | en |
thesis.grantor | Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav telekomunikací | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 3600160.3605038.pdf
- Size:
- 670.83 KB
- Format:
- Adobe Portable Document Format
- Description:
- file 3600160.3605038.pdf