Post-quantum alternative to secure sockets
|Thesis title in Czech:||Post-kvantová alternativa k bezpečným socketům|
|Thesis title in English:||Post-quantum alternative to secure sockets|
|Key words:||šifrování, bezpečnost, postkvantová kryptografie, diffie-hellman, supersingulární isogenie, eliptické křivky|
|English key words:||encryption, security, post-quantum cryptography, diffie-hellman, supersingular isogeny, elliptic curves|
|Academic year of topic announcement:||2016/2017|
|Type of assignment:||Bachelor's thesis|
|Department:||Department of Software Engineering (32-KSI)|
|Supervisor:||Mgr. Miroslav Kratochvíl|
|Author:||hidden - assigned and confirmed by the Study Dept.|
|Date of registration:||06.11.2016|
|Date of assignment:||07.11.2016|
|Confirmed by Study dept. on:||28.11.2016|
|Date and time of defence:||31.01.2017 00:00|
|Date of electronic submission:||04.01.2017|
|Date of submission of printed version:||04.01.2017|
|Date of proceeded defence:||31.01.2017|
|Reviewers:||RNDr. Jan Kofroň, Ph.D.|
|In post-quantum conditions, where a sufficiently large quantum computer is available to the adversary, the security of traditional cryptography protocols including all variants of RSA and the ubiquitous Diffie-Hellman key exchange can be broken in polynomial time using Shor's algorithm.
Supersingular Isogeny-based Diffie-Hellman key exchange (SIDH), as introduced by De Feo and Jao in 2011, is one of the best candidates for a key-exchange protocol in post-quantum settings. This thesis aims to design a communication protocol and to implement a software library that would allow to establish secure communication channels on the Internet, using the quantum-resistant SIDH as a main cryptographic primitive to provide confidentality and peer authentication.
|D. Jao and L. De Feo, Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Post-Quantum Cryptography, Nov 2011, Taipei, Taiwan. Springer, LNCS 7071, pp. 19-34, 2011.
L. De Feo, D. Jao and J. Plût, Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Journal of Mathematical Cryptology, 8(3), pp. 209-247. De Gruyter, 2014.
Schneier, Bruce. Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007.