On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures

dc.contributor.authorMalina, Lukášcs
dc.contributor.authorDobiáš, Patrikcs
dc.contributor.authorHajný, Jancs
dc.contributor.authorChoo, Kim-Kwang Raymondcs
dc.date.issued2023-08-29cs
dc.description.abstractAs quantum-safe algorithms are increasingly implemented in security protocols used in current and emerging digital services, there is also a corresponding need to map the current state of security protocols and applications and their preparedness for the post-quantum era. In this paper, we review current security recommendations, existing security libraries, and the support of Post-Quantum Cryptography (PQC) in widely-used security protocols. We also present a practical assessment of recently selected PQC algorithms by the National Institute of Standards and Technologies (NIST) PQC standardization on typical platforms that can be deployed in intelligent infrastructures (e.g., smartphones and single-boards), and recently recommended hash-based signatures for software/firmware signing. Finally, we discuss how incoming post-quantum migration affects selected areas in intelligent infrastructures.en
dc.formattextcs
dc.format.extent1-10cs
dc.format.mimetypeapplication/pdfcs
dc.identifier.citationARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security. 2023, p. 1-10.en
dc.identifier.doi10.1145/3600160.3605038cs
dc.identifier.isbn979-8-4007-0772-8cs
dc.identifier.orcid0000-0002-7208-2514cs
dc.identifier.orcid0000-0002-7321-7003cs
dc.identifier.orcid0000-0003-2831-1073cs
dc.identifier.other184534cs
dc.identifier.researcheridE-2174-2018cs
dc.identifier.scopus49863792100cs
dc.identifier.scopus55504712600cs
dc.identifier.urihttp://hdl.handle.net/11012/245031
dc.language.isoencs
dc.publisherAssociation for Computing Machinerycs
dc.relation.ispartofARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Securitycs
dc.relation.urihttps://dl.acm.org/doi/10.1145/3600160.3605038cs
dc.rightsCreative Commons Attribution 4.0 Internationalcs
dc.rights.accessopenAccesscs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjectApplied Cryptographyen
dc.subjectAssessmenten
dc.subjectPerformanceen
dc.subjectPost-Quantum Cryptographyen
dc.subjectSecurity Protocolsen
dc.subjectSecurity Recommendationsen
dc.titleOn Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructuresen
dc.type.driverconferenceObjecten
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
eprints.grantNumberinfo:eu-repo/grantAgreement/MV0/VJ/VJ03030014cs
sync.item.dbidVAV-184534en
sync.item.dbtypeVAVen
sync.item.insts2025.02.03 15:42:36en
sync.item.modts2025.01.17 15:12:38en
thesis.grantorVysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav telekomunikacícs
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3600160.3605038.pdf
Size:
670.83 KB
Format:
Adobe Portable Document Format
Description:
file 3600160.3605038.pdf