Abstract
Cryptographic processes hold immense power in securing data transmissions across the Internet in the modern age. Preparing for future hacking possibilities is deemed essential and crucial to combat data breaches and leaks. With the advent of quantum computing, a field capable of performing complex operations within a short time, breaking into the cryptographic system keys with sheer brute force is visibly possible. This paper aims to create a framework that runs post-quantum cryptographic algorithms shortlisted by NIST for Round 3 on the TLS protocol. The framework is built using Python with the help of LibOQS packages, programmed to work as an API, and invoked with the help of a web application. It allows cross-platform execution as it is contained in a Docker container. The established framework utilizes digital signature cryptography to verify the authenticity of a signed message and key encapsulation mechanism (KEM) for secure communication between client and server. The algorithms can be integrated with various internet-based applications like IoT, blockchain, but the results are demonstrated using a web application for this research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Frankenfield J (2019) An article on “Quantum Computing. [Online] Available: Investopedia, https://www.investopedia.com/terms/q/quantum-computing.asp. Accessed 3 Dec 2020
An article on “Quantum Superposition”. [Online] Available: Joint Quantum Institute, https://jqi.umd.edu/glossary/quantum-superposition. Accessed 10 June 2021
Pieper J, Lladser ME (2018) Quantum computation. Scholarpedia. [Online] Available: Scholarpedia, http://www.scholarpedia.org/article/Quantum_Computation#Quantum_Interference_and_Decoherence. Accessed 10 June 2021
Orzel C (2017) An article on “How do you create quantum entanglement?. [Online] Available: Forbes, https://www.forbes.com/sites/chadorzel/2017/02/28/how-do-you-create-quantum-entanglement/?sh=6d0ec4ea1732. Accessed 10 June 2021
An article on “Quantum Computing 101”. [Online] Available: University of Waterloo, https://uwaterloo.ca/institute-for-quantum-computing/quantum-computing-101. Accessed 3 Dec 2020
Sihare SR et al (2017) Analysis of quantum algorithms with classical systems counterpart. MECS, IJIEEB 9:20. https://doi.org/10.5815/ijieeb.2017.02.03
An initiative on “Post-Quantum Cryptography” (2020) [Online] Available: NIST Computer Security Resource Centre, https://csrc.nist.gov/projects/post-quantum-cryptography. Accessed 3 Dec 2020
Aaronson S (2013) Quantum computing since democritus. Cambridge University Press, ISBN 978-0-521-19956-8. Accessed 25 Nov 2020
Rieffel E, Polak W (2011) Quantum computing: a gentle introduction. MIT Press. Accessed 25 Nov 2020
Sutor RS (2019) Dancing with qubits. Packt Publications. ISBN 978-1-838-82736-6. Accessed 21 Jan 2020
Grau A (2020) An article on “Quantum-safe cryptography”. [Online] Available: Sectigo, https://sectigo.com/resource-library/quantum-safe-cryptography-surviving-the-upcoming-quantum-cryptographic-apocalypse. Accessed 25 Nov 2020
Hoursanov A (2020) an article on “Quantum-safe security”. [Online] Available: SAP Innovation Center Network https://icn.sap.com/article/quantum-safe-security-future-proof-data-protection. Accessed 25 Nov 2020
Campagna M et al (2015) Quantum-safe cryptography and security. ETSI White Paper No 8. [Online] Available: ETSI https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf. Accessed 25 Nov 2020
Lisa et al (2018) Cryptography in a post-quantum world. In: Quantum cryptography whitepaper, Version 5. [Online] Available: Accenture https://www.accenture.com/_acnmedia/PDF-87/Accenture-809668-Quantum-Cryptography-Whitepaper-v05.pdf. Accessed 25 Nov 2020
Lyubashevsky V et al (2020) “Security & Privacy”, an article in quantum-safe cryptography. [Online] Available: IBM Zurich https://www.zurich.ibm.com/securityprivacy/quantumsafecryptography.html. Accessed 25 Nov 2020
“Quantum-Safe Security Position Paper” by Quantum-Safe Security Working Group, 2016. [Online] Available: Cloud Security Alliance https://downloads.cloudsecurityalliance.org/initiatives/qss/What_is_Quantum_Safe_Security_position_paper.pdf. Accessed 25 Nov 2020
“Quantum Security Technologies” in White Paper Version 1.0, 2020. [Online] Available: National Cyber Security Center UK https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies. Accessed 25 Nov 2020
Easterbrook K et al (2020) Post-quantum TLS. [Online] Available: Microsoft https://www.microsoft.com/en-us/research/project/post-quantum-tls/. Accessed 25 Nov 2020
Sikeridis D et al (2020) Post-quantum authentication in TLS 1.3: a performance study. In: NDSS 2020. [Online] Available: Cryptology ePrint Archive https://eprint.iacr.org/2020/071. Accessed 4 Sept 2021
Sikeridis D et al (2020) Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In: CoNEXT 2020. [Online] Available: ACM https://doi.org/10.1145/3386367.3431305. Accessed 4 Sept 2021
Crockett E et al (2019) Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. In: NIST conference. [Online] Available: https://www.douglas.stebila.ca/research/papers/NISTPQC-CroPaqSte19/. Accessed 4 Sept 2021
Alagic G et al (2020) Status report on the second round of the NIST post-quantum cryptography standardisation process. NISTIR 8309. [Online] Available: NIST Computer Security Resource Center https://csrc.nist.gov/publications/detail/nistir/8309/final. Accessed 25 Nov 2020
Stebila D et al (2021) Open quantum-safe project. [Online] Available: Open Quantum-Safe, https://openquantumsafe.org/. Accessed 20 May 2021
An article on “Quantum Key Distribution” (2021) [Online] Available: IDQ Antique, https://www.idquantique.com/quantum-safe-security/overview/quantum-key-distribution/. Accessed 10 June 2021
Rescorla E (2018) Standards track—the transport layer security (TLS) protocol version 1.3. RFC 8846, ISSN 2070-1721. [Online] Available: IETF, https://datatracker.ietf.org/doc/html/rfc8446. Accessed 10 June 2021
OpenSSL Home (2018) [Online] Available: OpenSSL, https://www.openssl.org/. Accessed 15 May 2021
Stebila D et al. (2020) LibOQS Python. [Online] Available: GitHub https://github.com/open-quantum-safe/liboqs-python. Accessed 26 Mar 2021
Yegulalp S et al (2021) What is Docker? The spark for the container revolution. [Online] Available: InfoWorld https://www.infoworld.com/article/3204171/what-is-docker-the-spark-for-the-container-revolution.html. Accessed 26 Mar 2021
Stebila D et al (2021) OQS-OpenSSL_1_1_1. [Online] Available: https://github.com/open-quantum-safe/openssl. Accessed Mar 26, 2021
XML Security Working Group F2F (2009) Key encapsulation: a new scheme for public-key encryption. [online] Available: W3 Lists https://lists.w3.org/Archives/Public/public-xmlsec/2009May/att-0032/Key_Encapsulation.pdf. Accessed Mar 2021
Lutkevich B et al (2021) What is a digital signature?. [Online] Available: Tech Target https://searchsecurity.techtarget.com/definition/digital-signature. Accessed 10 Jun 2021
Stebila D et al (2021) LibOQS. [Online] Available: https://github.com/open-quantum-safe/liboqs. Accessed 26 Mar 2021
Pallets (2021) Flask documentation. [Online] Available: https://flask.palletsprojects.com/en/1.1.x/quickstart/. Accessed May 2021
Grinberg M (2021) Running your flask application over HTTPS. [Online] Available: https://blog.miguelgrinberg.com/post/running-your-flask-application-over. Accessed Apr 2021
Narendra Harny (2021) Implementing a web-socket using flask. [Online] Available: https://medium.com/swlh/implement-a-websocket-using-flask-and-socket-io-python-76afa5bbeae1. Accessed Apr 2021
Beullens W et al (2021) Post-quantum cryptography—current state and quantum mitigation. ENISA. [Online] Available: https://www.enisa.europa.eu/publications/post-quantum-cryptography-current-state-and-quantum-mitigation. Accessed May 2021
Acknowledgements
The research team sincerely thanks the team of Unisys India Pvt. Ltd, especially Mr. Anees Ahmed, for giving the opportunity to work on “Application of Quantum Algorithms for Network Protocols” and for providing guidance and support during its development. Special thanks to the mentors of the research, Dr. Thippeswamy M.N., and Mr. Vinay T.R. for their valuable insights. The team also extends gratitude to Nitte Meenakshi Institute of Technology for supporting with the required resources and for helping the idea materialize and succeed.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kolachana, V. et al. (2022). Application of Quantum Algorithms for Network Protocols. In: Bindhu, V., Tavares, J.M.R.S., Du, KL. (eds) Proceedings of Third International Conference on Communication, Computing and Electronics Systems . Lecture Notes in Electrical Engineering, vol 844. Springer, Singapore. https://doi.org/10.1007/978-981-16-8862-1_29
Download citation
DOI: https://doi.org/10.1007/978-981-16-8862-1_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8861-4
Online ISBN: 978-981-16-8862-1
eBook Packages: EngineeringEngineering (R0)