Skip to main content

Abstract

Cryptographic processes hold immense power in securing data transmissions across the Internet in the modern age. Preparing for future hacking possibilities is deemed essential and crucial to combat data breaches and leaks. With the advent of quantum computing, a field capable of performing complex operations within a short time, breaking into the cryptographic system keys with sheer brute force is visibly possible. This paper aims to create a framework that runs post-quantum cryptographic algorithms shortlisted by NIST for Round 3 on the TLS protocol. The framework is built using Python with the help of LibOQS packages, programmed to work as an API, and invoked with the help of a web application. It allows cross-platform execution as it is contained in a Docker container. The established framework utilizes digital signature cryptography to verify the authenticity of a signed message and key encapsulation mechanism (KEM) for secure communication between client and server. The algorithms can be integrated with various internet-based applications like IoT, blockchain, but the results are demonstrated using a web application for this research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Frankenfield J (2019) An article on “Quantum Computing. [Online] Available: Investopedia, https://www.investopedia.com/terms/q/quantum-computing.asp. Accessed 3 Dec 2020

  2. An article on “Quantum Superposition”. [Online] Available: Joint Quantum Institute, https://jqi.umd.edu/glossary/quantum-superposition. Accessed 10 June 2021

  3. Pieper J, Lladser ME (2018) Quantum computation. Scholarpedia. [Online] Available: Scholarpedia, http://www.scholarpedia.org/article/Quantum_Computation#Quantum_Interference_and_Decoherence. Accessed 10 June 2021

  4. Orzel C (2017) An article on “How do you create quantum entanglement?. [Online] Available: Forbes, https://www.forbes.com/sites/chadorzel/2017/02/28/how-do-you-create-quantum-entanglement/?sh=6d0ec4ea1732. Accessed 10 June 2021

  5. An article on “Quantum Computing 101”. [Online] Available: University of Waterloo, https://uwaterloo.ca/institute-for-quantum-computing/quantum-computing-101. Accessed 3 Dec 2020

  6. Sihare SR et al (2017) Analysis of quantum algorithms with classical systems counterpart. MECS, IJIEEB 9:20. https://doi.org/10.5815/ijieeb.2017.02.03

    Article  Google Scholar 

  7. An initiative on “Post-Quantum Cryptography” (2020) [Online] Available: NIST Computer Security Resource Centre, https://csrc.nist.gov/projects/post-quantum-cryptography. Accessed 3 Dec 2020

  8. Aaronson S (2013) Quantum computing since democritus. Cambridge University Press, ISBN 978-0-521-19956-8. Accessed 25 Nov 2020

    Google Scholar 

  9. Rieffel E, Polak W (2011) Quantum computing: a gentle introduction. MIT Press. Accessed 25 Nov 2020

    Google Scholar 

  10. Sutor RS (2019) Dancing with qubits. Packt Publications. ISBN 978-1-838-82736-6. Accessed 21 Jan 2020

    Google Scholar 

  11. Grau A (2020) An article on “Quantum-safe cryptography”. [Online] Available: Sectigo, https://sectigo.com/resource-library/quantum-safe-cryptography-surviving-the-upcoming-quantum-cryptographic-apocalypse. Accessed 25 Nov 2020

  12. Hoursanov A (2020) an article on “Quantum-safe security”. [Online] Available: SAP Innovation Center Network https://icn.sap.com/article/quantum-safe-security-future-proof-data-protection. Accessed 25 Nov 2020

  13. Campagna M et al (2015) Quantum-safe cryptography and security. ETSI White Paper No 8. [Online] Available: ETSI https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf. Accessed 25 Nov 2020

  14. Lisa et al (2018) Cryptography in a post-quantum world. In: Quantum cryptography whitepaper, Version 5. [Online] Available: Accenture https://www.accenture.com/_acnmedia/PDF-87/Accenture-809668-Quantum-Cryptography-Whitepaper-v05.pdf. Accessed 25 Nov 2020

  15. Lyubashevsky V et al (2020) “Security & Privacy”, an article in quantum-safe cryptography. [Online] Available: IBM Zurich https://www.zurich.ibm.com/securityprivacy/quantumsafecryptography.html. Accessed 25 Nov 2020

  16. “Quantum-Safe Security Position Paper” by Quantum-Safe Security Working Group, 2016. [Online] Available: Cloud Security Alliance https://downloads.cloudsecurityalliance.org/initiatives/qss/What_is_Quantum_Safe_Security_position_paper.pdf. Accessed 25 Nov 2020

  17. “Quantum Security Technologies” in White Paper Version 1.0, 2020. [Online] Available: National Cyber Security Center UK https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies. Accessed 25 Nov 2020

  18. Easterbrook K et al (2020) Post-quantum TLS. [Online] Available: Microsoft https://www.microsoft.com/en-us/research/project/post-quantum-tls/. Accessed 25 Nov 2020

  19. Sikeridis D et al (2020) Post-quantum authentication in TLS 1.3: a performance study. In: NDSS 2020. [Online] Available: Cryptology ePrint Archive https://eprint.iacr.org/2020/071. Accessed 4 Sept 2021

  20. Sikeridis D et al (2020) Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In: CoNEXT 2020. [Online] Available: ACM https://doi.org/10.1145/3386367.3431305. Accessed 4 Sept 2021

  21. Crockett E et al (2019) Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. In: NIST conference. [Online] Available: https://www.douglas.stebila.ca/research/papers/NISTPQC-CroPaqSte19/. Accessed 4 Sept 2021

  22. Alagic G et al (2020) Status report on the second round of the NIST post-quantum cryptography standardisation process. NISTIR 8309. [Online] Available: NIST Computer Security Resource Center https://csrc.nist.gov/publications/detail/nistir/8309/final. Accessed 25 Nov 2020

  23. Stebila D et al (2021) Open quantum-safe project. [Online] Available: Open Quantum-Safe, https://openquantumsafe.org/. Accessed 20 May 2021

  24. An article on “Quantum Key Distribution” (2021) [Online] Available: IDQ Antique, https://www.idquantique.com/quantum-safe-security/overview/quantum-key-distribution/. Accessed 10 June 2021

  25. Rescorla E (2018) Standards track—the transport layer security (TLS) protocol version 1.3. RFC 8846, ISSN 2070-1721. [Online] Available: IETF, https://datatracker.ietf.org/doc/html/rfc8446. Accessed 10 June 2021

  26. OpenSSL Home (2018) [Online] Available: OpenSSL, https://www.openssl.org/. Accessed 15 May 2021

  27. Stebila D et al. (2020) LibOQS Python. [Online] Available: GitHub https://github.com/open-quantum-safe/liboqs-python. Accessed 26 Mar 2021

  28. Yegulalp S et al (2021) What is Docker? The spark for the container revolution. [Online] Available: InfoWorld https://www.infoworld.com/article/3204171/what-is-docker-the-spark-for-the-container-revolution.html. Accessed 26 Mar 2021

  29. Stebila D et al (2021) OQS-OpenSSL_1_1_1. [Online] Available: https://github.com/open-quantum-safe/openssl. Accessed Mar 26, 2021

  30. XML Security Working Group F2F (2009) Key encapsulation: a new scheme for public-key encryption. [online] Available: W3 Lists https://lists.w3.org/Archives/Public/public-xmlsec/2009May/att-0032/Key_Encapsulation.pdf. Accessed Mar 2021

  31. Lutkevich B et al (2021) What is a digital signature?. [Online] Available: Tech Target https://searchsecurity.techtarget.com/definition/digital-signature. Accessed 10 Jun 2021

  32. Stebila D et al (2021) LibOQS. [Online] Available: https://github.com/open-quantum-safe/liboqs. Accessed 26 Mar 2021

  33. Pallets (2021) Flask documentation. [Online] Available: https://flask.palletsprojects.com/en/1.1.x/quickstart/. Accessed May 2021

  34. Grinberg M (2021) Running your flask application over HTTPS. [Online] Available: https://blog.miguelgrinberg.com/post/running-your-flask-application-over. Accessed Apr 2021

  35. Narendra Harny (2021) Implementing a web-socket using flask. [Online] Available: https://medium.com/swlh/implement-a-websocket-using-flask-and-socket-io-python-76afa5bbeae1. Accessed Apr 2021

  36. Beullens W et al (2021) Post-quantum cryptography—current state and quantum mitigation. ENISA. [Online] Available: https://www.enisa.europa.eu/publications/post-quantum-cryptography-current-state-and-quantum-mitigation. Accessed May 2021

Download references

Acknowledgements

The research team sincerely thanks the team of Unisys India Pvt. Ltd, especially Mr. Anees Ahmed, for giving the opportunity to work on “Application of Quantum Algorithms for Network Protocols” and for providing guidance and support during its development. Special thanks to the mentors of the research, Dr. Thippeswamy M.N., and Mr. Vinay T.R. for their valuable insights. The team also extends gratitude to Nitte Meenakshi Institute of Technology for supporting with the required resources and for helping the idea materialize and succeed.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kolachana, V. et al. (2022). Application of Quantum Algorithms for Network Protocols. In: Bindhu, V., Tavares, J.M.R.S., Du, KL. (eds) Proceedings of Third International Conference on Communication, Computing and Electronics Systems . Lecture Notes in Electrical Engineering, vol 844. Springer, Singapore. https://doi.org/10.1007/978-981-16-8862-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8862-1_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8861-4

  • Online ISBN: 978-981-16-8862-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics