<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Johanna Henrich | UCS</title><link>/author/johanna-henrich/</link><atom:link href="/author/johanna-henrich/index.xml" rel="self" type="application/rss+xml"/><description>Johanna Henrich</description><generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>en-us</language><lastBuildDate>Thu, 18 Dec 2025 11:00:00 +0000</lastBuildDate><image><url>/author/johanna-henrich/avatar_hu16091737687577162130.jpeg</url><title>Johanna Henrich</title><link>/author/johanna-henrich/</link></image><item><title>Prototype Development and Benchmarking for Secure Key Forwarding in QKDN</title><link>/offerings/2025-12-hiwi-qkdn-prototype/</link><pubDate>Thu, 18 Dec 2025 11:00:00 +0000</pubDate><guid>/offerings/2025-12-hiwi-qkdn-prototype/</guid><description>&lt;h2 id="motivation">Motivation&lt;/h2>
&lt;p>Leistungsstarke Quantencomputer könnten aktuell verwendete asymmetrische Verfahren wie Diffie Hellman und RSA brechen. Daher wurde in den vergangenen Jahren intensiv bezüglich quantensicherer Verfahren geforscht. Quantum Key Distribution (QKD) nutzt die Physik der Quanten, um einen informationstheoretisch sicheren Schlüsselaustausch zu gewährleisten. Die Reichweite des Verfahrens ist jedoch begrenzt und es sind nur einfache Punkt-zu-Punkt Verbindungen oder Sterntopologien möglich, weshalb QKD Netzwerke (QKDN) entwickelt wurden, welche den Schlüssel hop-by-hop weiterleiten. Um weiterhin die Sicherheit des Schlüssels zu garantieren, muss die Weiterleitung jedoch streng vertraulich und authentifiziert erfolgen.&lt;/p>
&lt;p>&lt;em>English: Powerful quantum computers could break currently used asymmetric schemes such as Diffie Hellman and RSA. For this reason, quantum-secure methods have been intensively researched in recent years. Quantum Key Distribution (QKD) uses the physics of quanta to ensure information theoretically secure key exchange. However, the distance covered by the scheme is limited, and only simple point-to-point connections or star topologies are possible. For this reason, QKD networks (QKDN) have been developed, which forward the key hop by hop. However, in order to maintain the security of the key, the forwarding must be very secure.&lt;/em>&lt;/p>
&lt;h2 id="ziel">Ziel&lt;/h2>
&lt;p>In vergangenen Projekten wurde eine Benchmarking Anwendung entwickelt, welche in der Lage ist, ein QKDN mit verschiedenen Knoten zu emulieren und ein Benchmarking durchzuführen, um die Schlüsseletablierung in einem QKD unterschiedlichen Konfigurationen zu evaluieren. Diese ist auch als Webanwendung verfügbar. Nun soll die Anwendung um diverse Konfigurationsmöglichkeiten erweitert und ein Benchmarking durchgeführt werden.&lt;/p>
&lt;p>&lt;em>English: In previous projects, a benchmarking application was developed that is capable of emulating a QKDN with different nodes and performing benchmarking to evaluate key establishment in a QKD in different configurations. The application is also available as a web application. Now, the application is to be expanded to include various configuration options and benchmarking is to be performed.&lt;/em>&lt;/p>
&lt;h2 id="aufgaben">Aufgaben&lt;/h2>
&lt;ul>
&lt;li>Vertrautmachen mit dem Forschungsfeld QKDN (&lt;em>Es geht um das grobe Verständnis. Du musst kein Experte auf dem Gebiet werden!&lt;/em> ;-))&lt;/li>
&lt;li>Vertrautmachen mit der bestehenden QKDN Emulationsanwendung&lt;/li>
&lt;li>Implementierung neuer Konfigurationsoptionen für das Key Forwarding innerhalb der QKDN Emulationsanwendung wie bspw.:
&lt;ul>
&lt;li>Authentifizierungsmechanismus der Knoten&lt;/li>
&lt;li>Hybridisierungsvariante der Schlüssel&lt;/li>
&lt;li>Mehrwegerouting&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Benchmarking des Key Forwardings und Gegenüberstellung der Varianten&lt;/li>
&lt;/ul>
&lt;p>&lt;em>English:&lt;/em>&lt;/p>
&lt;ul>
&lt;li>&lt;em>Familiarize yourself with the QKDN research field (It&amp;rsquo;s about a rough understanding. You don&amp;rsquo;t have to become an expert in the field! ;-))&lt;/em>&lt;/li>
&lt;li>&lt;em>Familiarize yourself with the existing QKDN emulation application&lt;/em>&lt;/li>
&lt;li>&lt;em>Implementation of new configuration options for key forwarding within the QKDN emulation application, such as:&lt;/em>
&lt;ul>
&lt;li>&lt;em>Authentication mechanism of the nodes&lt;/em>&lt;/li>
&lt;li>&lt;em>Hybridization variant of the keys&lt;/em>&lt;/li>
&lt;li>&lt;em>Multi-path routing&lt;/em>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;em>Benchmarking of key forwarding and comparison of the variants&lt;/em>&lt;/li>
&lt;/ul>
&lt;h2 id="voraussetzungen">Voraussetzungen&lt;/h2>
&lt;ul>
&lt;li>Du bist Masterstudent an der HDa&lt;/li>
&lt;li>Du besitzt Grundkenntnisse in IT-Sicherheit sowie Computernetze &amp;amp; Protokolle&lt;/li>
&lt;li>Du hast Erfahrung im Programmieren&lt;/li>
&lt;li>Du kannst eigenständig arbeiten&lt;/li>
&lt;/ul>
&lt;p>&lt;em>English:&lt;/em>&lt;/p>
&lt;ul>
&lt;li>&lt;em>You are a Master&amp;rsquo;s student at the HDa&lt;/em>&lt;/li>
&lt;li>&lt;em>You have basic knowledge of IT security and computer networks &amp;amp; protocols&lt;/em>&lt;/li>
&lt;li>&lt;em>You have experience in programming&lt;/em>&lt;/li>
&lt;li>&lt;em>You work independently&lt;/em>&lt;/li>
&lt;/ul>
&lt;h2 id="organisation-bei-hiwi-jobs">Organisation (bei HiWi Jobs)&lt;/h2>
&lt;ul>
&lt;li>Wahlweise 40 - 80 Std/Monat&lt;/li>
&lt;li>Flexible Arbeitszeiten und flexibler Arbeitsort&lt;/li>
&lt;li>Regelmäßige Treffen, um Ergebnisse und weiteres Vorgehen zu besprechen (2-3 Wochen Rhythmus)&lt;/li>
&lt;li>Vertragsdauer flexibel&lt;/li>
&lt;/ul>
&lt;p>&lt;em>English:&lt;/em>&lt;/p>
&lt;ul>
&lt;li>&lt;em>Optional 40-80 hours/month&lt;/em>&lt;/li>
&lt;li>&lt;em>Flexible work schedule and location&lt;/em>&lt;/li>
&lt;li>&lt;em>Regular meetings to discuss results and next steps (every 2-3 weeks)&lt;/em>&lt;/li>
&lt;li>&lt;em>Flexible contract length, beyond 2024 possible&lt;/em>&lt;/li>
&lt;/ul>
&lt;h2 id="referenzen-und-literatur-auswahl">Referenzen und Literatur (Auswahl)&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://doi.org/10.18420/sicherheit2024_024" target="_blank" rel="noopener">Henrich: Ways for confidential and authenticated hop-by-hop key establishment in QKDN&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://doi.org/10.1007/978-3-031-40003-2_22" target="_blank" rel="noopener">Bruckner, Ramacher, Striecks: Muckle+: End-to-End Hybrid Authenticated Key Exchanges&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://openquantumsafe.org" target="_blank" rel="noopener">Open Quantum Safe. Software for prototyping quantum-resistant cryptography&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.mdpi.com/2076-3417/11/9/3767" target="_blank" rel="noopener">Tsai, Yang, Lin, Chang, Chang: Quantum Key Distribution Networks: Challenges and Future Research Issues in Security&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=7993926" target="_blank" rel="noopener">Tanizawa, Takahashi, Sato, Dixon: An approach to integrate quantum key distribution technology into standard secure communication applications&lt;/a>&lt;/li>
&lt;/ul>
&lt;h2 id="beginn">Beginn&lt;/h2>
&lt;ul>
&lt;li>Ab April 2026&lt;/li>
&lt;/ul>
&lt;p>Bei Interesse melden Sie sich bitte bei &lt;a href="/author/johanna-henrich/">Johanna Henrich&lt;/a>.&lt;/p></description></item><item><title>Systematization of Knowledge (SoK): Architecture and Communication Patterns in QKD Networks</title><link>/offerings/2025-12-hiwi-sok-qkdn/</link><pubDate>Thu, 18 Dec 2025 11:00:00 +0000</pubDate><guid>/offerings/2025-12-hiwi-sok-qkdn/</guid><description>&lt;h2 id="motivation">Motivation&lt;/h2>
&lt;p>Damit ein Wissenschaftler gute Arbeit leistet, muss er sich gut in seinem Forschungsfeld auskennen und immer auf dem Laufenden bleiben. Da unser Forschungsfeld der quantensicheren Kommunikation und im speziellen &lt;em>Quantum Key Distribution Networks (QKDN)&lt;/em> jedoch sehr interdisziplinär aufgestellt ist und die Weiterentwicklung sehr schnell voran schreitet, ist es nur schwer möglich, stets den Überblick zu behalten. Damit das besser gelingt, nutzen wir das Tool &lt;a href="https://www.zotero.org/" target="_blank" rel="noopener">Zotero&lt;/a> für die digitale Literaturverwaltung. Auch wenn das vieles erleichtert, müssen die Arbeiten strukturiert eingepflegt und thematisch geordnet werden, um sich im Literaturdschungel zurecht zu finden.&lt;/p>
&lt;p>&lt;em>English: For a scientist to do good work, they need to be well-versed in their field of research and always stay up to date. However, since our research field of quantum secure communication and in particular Quantum Key Distribution Networks (QKDN) combines many different specialist areas and advancements are taking place very quickly, it is difficult to keep up with everything all the time. To make this easier, we use the Zotero tool for digital literature management. Even though this makes many things easier, it&amp;rsquo;s important to enter the work in a structured manner and organize it thematically so you can find your way through the literature jungle.&lt;/em>&lt;/p>
&lt;h2 id="ziel">Ziel&lt;/h2>
&lt;p>Wir benötigen eine strukturierte, thematisch geordnete Auflistung der verfügbaren Literatur des Forschungsfeldes QKDN. Publikationen müssen entsprechend ihrem Inhalt in Ordnern geclustert und zusätzlich sinnvoll getaggt werden, um für spätere wissenschaftliche Arbeiten schnell auf eine Literturbasis zurückgreifen zu können.&lt;/p>
&lt;p>&lt;em>English: We need a structured, thematically organized list of available literature in the field of QKDN research. Publications need to be grouped into folders according to their content and tagged in a meaningful way in order to be able to quickly access a literature base for later scientific work.&lt;/em>&lt;/p>
&lt;h2 id="aufgaben">Aufgaben&lt;/h2>
&lt;ul>
&lt;li>Vertraut machen mit dem Forschungsfeld QKDN (&lt;em>Es geht um das grobe Verständnis. Du musst kein Experte auf dem Gebiet werden!&lt;/em> ;-))&lt;/li>
&lt;li>Einarbeiten in Zotero und unsere bestehende Literatursammlung&lt;/li>
&lt;li>Neue Ordnerstruktur anlegen und die in Zotero gesammelten Arbeiten zuordnen&lt;/li>
&lt;li>Noch nicht in Zotero eingepflegte Arbeiten einpflegen und ebenfalls zurordnen&lt;/li>
&lt;li>Kontinuierliche Literaturrecherche, damit unsere Sammlung auf dem neuesten Stand bleibt&lt;/li>
&lt;li>&lt;em>Optional&lt;/em>: Konzept für eine sinnvolle Verwendung von Tags in Zotero&lt;/li>
&lt;/ul>
&lt;p>&lt;em>English:&lt;/em>&lt;/p>
&lt;ul>
&lt;li>&lt;em>Familiarize yourself with the QKDN research field (It&amp;rsquo;s about a rough understanding. You don&amp;rsquo;t have to become an expert in the field! ;-))&lt;/em>&lt;/li>
&lt;li>&lt;em>Become familiar with Zotero and our existing literature collection&lt;/em>&lt;/li>
&lt;li>&lt;em>Create a new folder structure and assign works collected in Zotero&lt;/em>&lt;/li>
&lt;li>&lt;em>Enter and assign works not yet entered in Zotero&lt;/em>&lt;/li>
&lt;li>&lt;em>Perform ongoing literature research to keep our collection up-to-date&lt;/em>&lt;/li>
&lt;li>&lt;em>Optional: Conceptualize a meaningful use of tags in Zotero&lt;/em>&lt;/li>
&lt;/ul>
&lt;h2 id="voraussetzungen">Voraussetzungen&lt;/h2>
&lt;ul>
&lt;li>Du bist Bachelor- oder Masterstudent an der HDa&lt;/li>
&lt;li>Du besitzt Grundkenntnisse in IT-Sicherheit sowie Computernetze &amp;amp; Protokolle&lt;/li>
&lt;li>Du bist gut im Strukturieren und Sortieren&lt;/li>
&lt;li>Du hast Spaß an Literaturrecherche und konzeptioneller Arbeit&lt;/li>
&lt;li>Du kannst eigenständig arbeiten&lt;/li>
&lt;/ul>
&lt;p>&lt;em>English:&lt;/em>&lt;/p>
&lt;ul>
&lt;li>&lt;em>You are a bachelor or master student at the HDa&lt;/em>&lt;/li>
&lt;li>&lt;em>You have basic knowledge of IT security and computer networks &amp;amp; protocols&lt;/em>&lt;/li>
&lt;li>&lt;em>You are good at structuring and organizing&lt;/em>&lt;/li>
&lt;li>&lt;em>You enjoy literature research and conceptual work&lt;/em>&lt;/li>
&lt;li>&lt;em>You work independently&lt;/em>&lt;/li>
&lt;/ul>
&lt;h2 id="organisation">Organisation&lt;/h2>
&lt;ul>
&lt;li>Wahlweise 40 - 80 Std/Monat&lt;/li>
&lt;li>Flexible Arbeitszeiten und flexibler Arbeitsort&lt;/li>
&lt;li>Regelmäßige Treffen, um Ergebnisse und weiteres Vorgehen zu besprechen (2-3 Wochen Rhythmus)&lt;/li>
&lt;li>Vertragsdauer flexibel&lt;/li>
&lt;/ul>
&lt;p>&lt;em>English:&lt;/em>&lt;/p>
&lt;ul>
&lt;li>&lt;em>Optional 40-80 hours/month&lt;/em>&lt;/li>
&lt;li>&lt;em>Flexible work schedule and location&lt;/em>&lt;/li>
&lt;li>&lt;em>Regular meetings to discuss results and next steps (every 2-3 weeks)&lt;/em>&lt;/li>
&lt;li>&lt;em>Flexible contract length&lt;/em>&lt;/li>
&lt;/ul>
&lt;h2 id="referenzen-und-literatur-auswahl">Referenzen und Literatur (Auswahl)&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://doi.org/10.11588/heidok.00031206" target="_blank" rel="noopener">Kurzanleitung für Zotero (Universitätsbibliothek Heidelberg)&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://mediatum.ub.tum.de/doc/1316333/1316333.pdf" target="_blank" rel="noopener">Lemke, Böhner: Softwarevergleich Literaturverwaltung&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://doi.org/10.18420/sicherheit2024_024" target="_blank" rel="noopener">Henrich: Ways for confidential and authenticated hop-by-hop key establishment in QKDN&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.mdpi.com/2076-3417/11/9/3767" target="_blank" rel="noopener">Tsai, Yang, Lin, Chang, Chang: Quantum Key Distribution Networks: Challenges and Future Research Issues in Security&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=7993926" target="_blank" rel="noopener">Tanizawa, Takahashi, Sato, Dixon: An approach to integrate quantum key distribution technology into standard secure communication applications&lt;/a>&lt;/li>
&lt;/ul>
&lt;h2 id="beginn">Beginn&lt;/h2>
&lt;ul>
&lt;li>Ab April 2026&lt;/li>
&lt;/ul>
&lt;p>Bei Interesse melden Sie sich bitte bei &lt;a href="/author/johanna-henrich/">Johanna Henrich&lt;/a>.&lt;/p></description></item><item><title>Systematization of Knowledge (SoK): Secure Key Forwarding in QKDN</title><link>/offerings/2025-12-thesis-sok-qkdn-forwarding/</link><pubDate>Thu, 18 Dec 2025 11:00:00 +0000</pubDate><guid>/offerings/2025-12-thesis-sok-qkdn-forwarding/</guid><description>&lt;h2 id="motivation">Motivation&lt;/h2>
&lt;p>Leistungsstarke Quantencomputer könnten aktuell verwendete asymmetrische Verfahren wie Diffie Hellman und RSA brechen. Daher wurde in den vergangenen Jahren intensiv bezüglich quantensicherer Verfahren geforscht. Quantum Key Distribution (QKD) nutzt die Physik der Quanten, um einen informationstheoretisch sicheren Schlüsselaustausch zu gewährleisten. Die Reichweite des Verfahrens ist jedoch begrenzt und es sind nur einfache Punkt-zu-Punkt Verbindungen oder Sterntopologien möglich, weshalb QKD Netzwerke (QKDN) entwickelt wurden, welche den Schlüssel hop-by-hop weiterleiten. Um weiterhin die Sicherheit des Schlüssels zu garantieren, muss die Weiterleitung jedoch streng vertraulich und authentifiziert erfolgen.
In den vergangenen Jahren wurden bereits unterschiedliche wissenschaftliche Arbeiten zur sicheren Weiterleitung eines Schlüssels im QKDN veröffentlicht, aber ein Gesamtüberblick und eine Evaluierung der unterschiedlichen Ansätze steht aus.&lt;/p>
&lt;p>&lt;em>English: Powerful quantum computers could break currently used asymmetric schemes such as Diffie Hellman and RSA. For this reason, quantum-secure methods have been intensively researched in recent years. Quantum Key Distribution (QKD) uses the physics of quanta to ensure information theoretically secure key exchange. However, the distance covered by the scheme is limited, and only simple point-to-point connections or star topologies are possible. For this reason, QKD networks (QKDN) have been developed, which forward the key hop by hop. However, in order to maintain the security of the key, the forwarding must be very secure.&lt;/em>
&lt;em>In recent years, various scientific papers on the secure transmission of keys in QKDN have been published, but a comprehensive overview and evaluation of the different approaches is still pending.&lt;/em>&lt;/p>
&lt;h2 id="ziel">Ziel&lt;/h2>
&lt;p>In der Arbeit soll eine Übersicht dazu liefern, welche unterschiedlichen Ansätze zum Key Forwarding in QKDN in der wissenschaftlichen Literatur beschrieben werden und wie diese einzuordnen sind.&lt;/p>
&lt;p>&lt;em>English: This paper aims to provide an overview of the different approaches to key forwarding in QKDN described in the scientific literature and how these can be classified.&lt;/em>&lt;/p>
&lt;h2 id="aufgaben">Aufgaben&lt;/h2>
&lt;ul>
&lt;li>Vertrautmachen mit dem Forschungsfeld QKDN (&lt;em>Es geht um das grobe Verständnis. Du musst kein Experte auf dem Gebiet werden!&lt;/em> ;-))&lt;/li>
&lt;li>Literaturrecherche zu QKDN Key Forwarding&lt;/li>
&lt;li>Systematisierte Einordnung/Klassifizierung der gefundenen Literatur&lt;/li>
&lt;/ul>
&lt;p>&lt;em>English:&lt;/em>&lt;/p>
&lt;ul>
&lt;li>&lt;em>Familiarize yourself with the QKDN research field (It&amp;rsquo;s about a rough understanding. You don&amp;rsquo;t have to become an expert in the field! ;-))&lt;/em>&lt;/li>
&lt;li>&lt;em>Literature research on QKDN key forwarding&lt;/em>&lt;/li>
&lt;li>&lt;em>Systematic classification of the literature found&lt;/em>&lt;/li>
&lt;/ul>
&lt;h2 id="voraussetzungen">Voraussetzungen&lt;/h2>
&lt;ul>
&lt;li>Du bist Masterstudent an der HDa&lt;/li>
&lt;li>Du besitzt Grundkenntnisse in IT-Sicherheit sowie Computernetze &amp;amp; Protokolle&lt;/li>
&lt;li>Du hast Erfahrung im Programmieren&lt;/li>
&lt;li>Du kannst eigenständig arbeiten&lt;/li>
&lt;/ul>
&lt;p>&lt;em>English:&lt;/em>&lt;/p>
&lt;ul>
&lt;li>&lt;em>You are a Master&amp;rsquo;s student at the HDa&lt;/em>&lt;/li>
&lt;li>&lt;em>You have basic knowledge of IT security and computer networks &amp;amp; protocols&lt;/em>&lt;/li>
&lt;li>&lt;em>You have experience in programming&lt;/em>&lt;/li>
&lt;li>&lt;em>You work independently&lt;/em>&lt;/li>
&lt;/ul>
&lt;h2 id="referenzen-und-literatur-auswahl">Referenzen und Literatur (Auswahl)&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://doi.org/10.18420/sicherheit2024_024" target="_blank" rel="noopener">Henrich: Ways for confidential and authenticated hop-by-hop key establishment in QKDN&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.mdpi.com/2076-3417/11/9/3767" target="_blank" rel="noopener">Tsai, Yang, Lin, Chang, Chang: Quantum Key Distribution Networks: Challenges and Future Research Issues in Security&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=7993926" target="_blank" rel="noopener">Tanizawa, Takahashi, Sato, Dixon: An approach to integrate quantum key distribution technology into standard secure communication applications&lt;/a>&lt;/li>
&lt;/ul>
&lt;h2 id="beginn">Beginn&lt;/h2>
&lt;ul>
&lt;li>Ab April 2026&lt;/li>
&lt;/ul>
&lt;p>Bei Interesse melden Sie sich bitte bei &lt;a href="/author/johanna-henrich/">Johanna Henrich&lt;/a>.&lt;/p></description></item><item><title>Integration von PQC in bewährte Netzwerkkommunikationsprotokolle</title><link>/offerings/2025-12-thesis-pqc-network-protocol-integration/</link><pubDate>Thu, 18 Dec 2025 00:00:00 +0000</pubDate><guid>/offerings/2025-12-thesis-pqc-network-protocol-integration/</guid><description>&lt;h2 id="motivation">Motivation&lt;/h2>
&lt;p>Sobald ein leistungsstarker Quantencomputer verfügbar ist, können aktuell verwendete asymmetrische Verfahren wie Diffie Hellman und RSA gebrochen werden. Der Mathematiker Peter Shor entwickelte bereits 1994 einen entsprechenden Algorithmus. Asymmetrische Kryptografie wird in unzähligen digitalen Systemen für einen vertraulichen Schlüsselaustausch und eine Authentifizierung genutzt. Daher wurde in den vergangenen Jahren intensiv bezüglich quantensicherer Verfahren geforscht. Alternative Verfahren der Post-Quanten-Kryptographie (PQC) weisen jedoch sehr individuelle Charakteristiken auf, sodass in der Regel kein Eins-zu-Eins-Austausch möglich ist.&lt;/p>
&lt;h2 id="ziel">Ziel&lt;/h2>
&lt;p>Ziel der Arbeit ist die Ausarbeitung von Möglichkeiten zur Integration von PQC Algorithmen in ein oder mehrere Kommunikationsprotokolle, welche aktuell auf klassische kryptographische Primitive zurückgreifen. Denkbar wären Protokolle wie IPSec und IKEv2 oder DTLS. Sofern bereits mehrere Implementierungen und Evaluationen dieser beschrieben wurden, sollten diese aufgeführt und verglichen werden. Es können auch Änderungen an in der Literatur beschriebenen Konzepten vorgeschlagen oder gänzich neue Versionen designt werden. Verfügbare Implementierungen sollen abschließend mit Hilfe des von UCS entwickelten Frameworks evaluiert werden.&lt;/p>
&lt;h2 id="aufgaben">Aufgaben&lt;/h2>
&lt;ul>
&lt;li>Literaturrecherche zu Optionen bezüglich Integration in bekannte Protokolle wie IPSec und IKEv2 oder DTLS&lt;/li>
&lt;li>Einschätzung zur Anwendbarkeit der Optionen und Ausarbeitung signifikanter Unterschiede zwischen Implementierungen&lt;/li>
&lt;li>Vorschläge zur Optimierung der Optionen oder Ausarbeitung von Alternativen&lt;/li>
&lt;li>Integration von Implementierungen in das Framework aus der Masterarbeit von Henrich zur Evalueirung der neuen Protkollversionen&lt;/li>
&lt;/ul>
&lt;h2 id="voraussetzungen">Voraussetzungen&lt;/h2>
&lt;ul>
&lt;li>Kenntnisse in IT-Sicherheit, insbesondere asymmetrische Kryptographie&lt;/li>
&lt;li>Kenntnisse in Computernetze &amp;amp; Protokolle&lt;/li>
&lt;li>Grundkenntnisse in Linux&lt;/li>
&lt;li>Spaß an Literaturrecherche und konzeptioneller Arbeit&lt;/li>
&lt;/ul>
&lt;h2 id="referenzen-und-literatur-auswahl">Referenzen und Literatur (Auswahl)&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://doi.org/10.48550/arXiv.2303.15148" target="_blank" rel="noopener">Johanna Henrich: Performanz Evaluation von PQC in TLS 1.3 unter variierenden Netzwerkcharakteristiken. Abschlussarbeit M.Sc.. Februar 2022&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://eprint.iacr.org/2019/1447.pdf" target="_blank" rel="noopener">Paquin, Stebila, Tamvada: Benchmarking post-quantum cryptography in TLS. PQCrypto 2020&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank" rel="noopener">NIST Post-Quantum Cryptography Standardization&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://openquantumsafe.org" target="_blank" rel="noopener">Open Quantum Safe. Software for prototyping quantum-resistant cryptography&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://dl.acm.org/doi/pdf/10.1145/3386367.3431305" target="_blank" rel="noopener">Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.researchgate.net/publication/348958250_Zur_Integration_von_Post-Quantum_Verfahren_in_bestehende_Softwareprodukte/fulltext/6018c719299bf1b33e405bef/Zur-Integration-von-Post-Quantum-Verfahren-in-bestehende-Softwareprodukte.pdf" target="_blank" rel="noopener">Zur Integration von Post-Quantum Verfahren in bestehende Softwareprodukte&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-ikev2-multiple-ke" target="_blank" rel="noopener">Multiple Key Exchanges in IKEv2 (IETF Internetdraft)&lt;/a>&lt;/li>
&lt;/ul>
&lt;h2 id="beginn">Beginn&lt;/h2>
&lt;ul>
&lt;li>Ab April 2026&lt;/li>
&lt;/ul>
&lt;p>Bei Interesse melden Sie sich bitte bei &lt;a href="/author/johanna-henrich/">Johanna Henrich&lt;/a>.&lt;/p></description></item><item><title>Integration von QKD in TLS</title><link>/offerings/2025-12-thesis-qkd-in-tls/</link><pubDate>Thu, 18 Dec 2025 00:00:00 +0000</pubDate><guid>/offerings/2025-12-thesis-qkd-in-tls/</guid><description>&lt;h2 id="motivation">Motivation&lt;/h2>
&lt;p>Sobald ein leistungsstarker Quantencomputer verfügbar ist, können aktuell verwendete asymmetrische Verfahren wie Diffie Hellman und RSA gebrochen werden. Der Mathematiker Peter Shor entwickelte bereits 1994 einen entsprechenden Algorithmus. Asymmetrische Kryptografie wird in unzähligen digitalen Systemen für einen vertraulichen Schlüsselaustausch und eine Authentifizierung genutzt. Daher wurde in den vergangenen Jahren intensiv bezüglich quantensicherer Verfahren geforscht. Quantum Key Distribution (QKD) nutzt die Physik der Quanten, um einen informationstheoretisch sicheren Schlüsselaustausch zu gewährleisten. Zukünftig sollen Endnutzer über eine einfache HTTP-basierte Schnittstelle an ein QKD-Netzwerk (QKDN) angebunden werden, welches symmetrische Schlüssel für entfernte Kommunikationspartner bereitstellt. Die Schlüssel werden über eine einfache ID eindeutig zugeordnet.&lt;/p>
&lt;h2 id="ziel">Ziel&lt;/h2>
&lt;p>Ziel der Arbeit ist die Ausarbeitung von Möglichkeiten zur Integration von QKD in das vielfach verwendete Protokoll TLS 1.3. Dafür muss die Anwendungsschnittstelle eines QKDNs analysiert und mit den unterschiedlichen Erweiterungsmöglichkeiten von TLS abgeglichen werden. Die erarbeiteten Optionen sollen beschrieben und gegenübergestellt werden. Bereits verfügbare Prototypen könnten zudem getestet oder Konzepte selbst prototypisch implementiert werden. Auch eine anschließende Performanz Evaluation wäre denkbar.&lt;/p>
&lt;h2 id="aufgaben">Aufgaben&lt;/h2>
&lt;ul>
&lt;li>Literatur- und Internetrecherche zu Optionen bezüglich der Integration von QKD in TLS&lt;/li>
&lt;li>Ausarbeitung von Integrationsmöglichkeiten für QKD in TLS - sowohl aus der Literatur als auch eigene Ideen&lt;/li>
&lt;li>Einschätzung zur Anwendbarkeit der Optionen und Ausarbeitung signifikanter Unterschiede zwischen diesen&lt;/li>
&lt;li>&lt;em>Optional&lt;/em>: Vorschläge zur Optimierung der Optionen oder Ausarbeitung einer alternativen Vorgehensweise&lt;/li>
&lt;li>&lt;em>Optional&lt;/em>: Inbetriebnahme verfügbarer Prototypen oder Implementierung eines eigenen Prototypen&lt;/li>
&lt;li>&lt;em>Optional&lt;/em>: Integration von Implementierungen in das Framework aus der Masterarbeit von Henrich und Evaluierung der Performanz&lt;/li>
&lt;/ul>
&lt;h2 id="voraussetzungen">Voraussetzungen&lt;/h2>
&lt;ul>
&lt;li>Kenntnisse in IT-Sicherheit&lt;/li>
&lt;li>Kenntnisse in Computernetze &amp;amp; Protokolle, insbesondere TLS&lt;/li>
&lt;li>Grundkenntnisse in Linux&lt;/li>
&lt;li>Grundkenntnisse und Interesse im Bereich Quantenphysik oder Elektrotechnik wünschenswert, aber nicht zwingend erforderlich&lt;/li>
&lt;li>Spaß an Literaturrecherche und konzeptioneller Arbeit&lt;/li>
&lt;/ul>
&lt;h2 id="referenzen-und-literatur-auswahl">Referenzen und Literatur (Auswahl)&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://doi.org/10.48550/arXiv.2303.15148" target="_blank" rel="noopener">Johanna Henrich: Performanz Evaluation von PQC in TLS 1.3 unter variierenden Netzwerkcharakteristiken. Abschlussarbeit M.Sc.. Februar 2022&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://eprint.iacr.org/2019/1447.pdf" target="_blank" rel="noopener">Paquin, Stebila, Tamvada: Benchmarking post-quantum cryptography in TLS. PQCrypto 2020&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://openquantumsafe.org" target="_blank" rel="noopener">Open Quantum Safe. Software for prototyping quantum-resistant cryptography&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.mdpi.com/2076-3417/11/9/3767" target="_blank" rel="noopener">Tsai, Yang, Lin, Chang, Chang: Quantum Key Distribution Networks: Challenges and Future Research Issues in Security&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=7993926" target="_blank" rel="noopener">Tanizawa, Takahashi, Sato, Dixon: An approach to integrate quantum key distribution technology into standard secure communication applications&lt;/a>&lt;/li>
&lt;/ul>
&lt;h2 id="beginn">Beginn&lt;/h2>
&lt;ul>
&lt;li>Ab April 2026&lt;/li>
&lt;/ul>
&lt;p>Bei Interesse melden Sie sich bitte bei &lt;a href="/author/johanna-henrich/">Johanna Henrich&lt;/a>.&lt;/p></description></item><item><title>A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?</title><link>/publication/2025-isc-henrich/</link><pubDate>Mon, 15 Sep 2025 05:01:40 +0000</pubDate><guid>/publication/2025-isc-henrich/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>In a previous study, Henrich et al. (ISC &amp;lsquo;23) demonstrate how TLS handshake performance is affected not only by different Post Quantum Cryptography (PQC) Key Encapsulation Mechanisms KEMs and security levels, but also by varying physical network conditions. In particular, they show that prior to selecting a PQC scheme replacement for TLS, it is important to conduct an analysis of the anticipated network conditions for applications that require a high level of responsiveness. In this paper, we build upon the afore mentioned work and complement the previous experiments to include digital signature PQC schemes and hybrid variants, as well as various compositions of certificate chains. Moreover, an analysis is conducted on the effects of deploying real physical servers and varying the underlying network stack configuration. Our results show that incorporating PQC signature schemes does not negatively impact the overall transmission time as substantially as poor network conditions. However, operating at high security levels frequently results in delays using PQC schemes. These findings are consistent across hybrid schemes as well. We conclude that migrating TLS to PQ-only or hybrid usage can generally be undertaken with a high degree of confidence. However, considering suboptimal network conditions or the use of higher security levels, a cautious transition is recommended. In such cases, the configuration of certificate chains or increasing the TCP Congestion Window might prove beneficial.&lt;/p></description></item><item><title>DemoQuanDT: a carrier-grade QKD network</title><link>/publication/2025-jocn-henrich/</link><pubDate>Mon, 04 Aug 2025 05:01:40 +0000</pubDate><guid>/publication/2025-jocn-henrich/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>Quantum key distribution networks (QKDNs) enable secure communication even in the age of powerful quantum computers. In the hands of a network operator, which can offer its service to many users, the economic viability of a QKDN increases significantly. The highly challenging operator–user relationship in a large-scale network setting demands additional requirements to ensure carrier-grade operation. Addressing this challenge, this work presents a carrier-grade QKDN architecture, which combines the functional QKDN architecture with the operational perspective of a network operator, ultimately enhancing the economic viability of QKDNs. The focus is on the network and key management aspects of a QKDN while assuming state-of-the-art commercial QKD modules. The presented architecture was rolled out within an in-field demonstrator, connecting the cities of Berlin and Bonn over a link distance of 923 km across Germany. We could show that the proposed network architecture is feasible, integrable, and scalable, making it suitable for deployment in real-world networks. Overall, the presented carrier-grade QKDN architecture promises to serve as a blueprint for network operators providing QKD-based services to their customers.&lt;/p></description></item><item><title>Nationale Konferenz IT-Sicherheitsforschung 2025</title><link>/post/2025-03-17-bmbf-konf-berlin/</link><pubDate>Sun, 16 Mar 2025 00:00:00 +0000</pubDate><guid>/post/2025-03-17-bmbf-konf-berlin/</guid><description>&lt;p>UCS will present the results of the DemoQuanDT research project in a poster session at the &lt;a href="https://www.forschung-it-sicherheit-kommunikationssysteme.de/service/termine/nationale-konferenz-it-sicherheitsforschung-2025" target="_blank" rel="noopener">&amp;ldquo;National Conference IT Security Research 2025 - IT Security and Democracy&amp;rdquo;&lt;/a> in Berlin, which is being hosted by the German Federal Ministry of Education and Research (BMBF).&lt;/p>
&lt;p>The presentation will be based on a poster entitled &amp;ldquo;Confidential and authenticated key forwarding in QKD networks,&amp;rdquo; which has been accepted for the poster pitch on March 18, 2025. The central inquiry concerns the extent to which security and performance can be assured for key forwarding in extensive, interconnected QKD networks. The technology is poised to facilitate secure transmission of messages, that is, confidentiality and authentication. In contradistinction to the asymmetric cryptographic approaches currently employed, the security of the QKD system is expected to withstand the threat posed by quantum computers.&lt;/p>
&lt;p>The poster was authored by Johanna Henrich. Her research focuses on key establishment in QKD networks and the potential for integrating QKD and PQC to ensure quantum-safe and high-performance communication. The research is conducted in close collaboration with the &lt;a href="https://danet.h-da.io/" target="_blank" rel="noopener">danet research group&lt;/a> led by Prof. Dr Martin Stiemerling.&lt;/p>
&lt;p>
&lt;figure id="figure-image-169-national-conference-it-security-research-2025httpswwwforschung-it-sicherheit-kommunikationssystemedeserviceterminenationale-konferenz-it-sicherheitsforschung-2025">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="National Conference IT Security Research 2025" srcset="
/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu13903682880246765859.webp 400w,
/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu2897823824235519899.webp 760w,
/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu11718390987991694070.webp 1200w"
src="/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu13903682880246765859.webp"
width="760"
height="397"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: &lt;a href="https://www.forschung-it-sicherheit-kommunikationssysteme.de/service/termine/nationale-konferenz-it-sicherheitsforschung-2025" target="_blank" rel="noopener">National Conference IT Security Research 2025&lt;/a>
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>IETF Meeting 121 in Dublin</title><link>/post/2024-11-01-ietf-meeting-121-dublin/</link><pubDate>Thu, 24 Oct 2024 00:00:00 +0000</pubDate><guid>/post/2024-11-01-ietf-meeting-121-dublin/</guid><description>&lt;p>UCS took part in the &lt;a href="https://www.ietf.org/meeting/121/" target="_blank" rel="noopener">121st meeting of the Internet Engineering Task Force (IETF) in Dublin&lt;/a> from 2.-8. November 2024. The IETF develops standards and best practices for the Internet and thus has a significant influence on its design.&lt;/p>
&lt;p>Among other things, Johanna Henrich led a project group together with the &lt;a href="https://danet.h-da.io/" target="_blank" rel="noopener">&lt;em>danet&lt;/em>&lt;/a> research group of Prof. Dr. Martin Stiemerling. The project was part of the &lt;a href="https://www.ietf.org/meeting/hackathons/121-hackathon/" target="_blank" rel="noopener">Hackathon&lt;/a>, which took place from 2.-3. November. The aim was to find out how the interfaces in Quantum Key Distribution Networks (QKDN) can be designed and how quantum-resistant protection of their communication can be achieved. Read more in our &lt;a href="https://datatracker.ietf.org/meeting/121/materials/slides-121-hackathon-sessd-protocols-for-quantum-key-distribution-networks-qkdn-00" target="_blank" rel="noopener">final presentation&lt;/a>.&lt;/p>
&lt;p>In addition, Johanna Henrich participated in various IETF and IRTF working group sessions throughout the week to answer questions such as how post-quantum cryptography (PQC) and QKD, individually and in hybrid form, can be integrated into the existing Internet infrastructure.&lt;/p>
&lt;p>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="H_da@IETF121" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu750836535530113213.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu16660504106634181873.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu4076067445614435600.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu750836535530113213.webp"
width="760"
height="683"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Dublin Convention Center" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu2475273792349512832.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu17787974089270791007.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu5725797291102983458.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu2475273792349512832.webp"
width="760"
height="570"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Hackaton@IETF121" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu18262922610363661176.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu15313571835690591437.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu14090310200751563479.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu18262922610363661176.webp"
width="678"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Dublin impressions" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu11480959661179178800.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu2861291465665790847.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu14462442235763723863.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu11480959661179178800.webp"
width="760"
height="518"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Rump Session at ECOC 2024</title><link>/post/2024-09-22-ecoc-rump-session/</link><pubDate>Thu, 24 Oct 2024 00:00:00 +0000</pubDate><guid>/post/2024-09-22-ecoc-rump-session/</guid><description>&lt;p>On 24 September 2024, Johanna Henrich accepted an invitation to take part in a rump session at the &lt;a href="https://www.ecoc2024.org/" target="_blank" rel="noopener">European Conference on Optical Communication (ECOC) 2024&lt;/a>. The session dealt with the pros and cons of post-quantum cryptography and quantum key distribution, and the extent to which they can be used in combination to reliably protect us from future attacks by quantum computers.&lt;/p>
&lt;p>ECOC is Europe&amp;rsquo;s leading conference on optical communications with representatives from science and research. It consists of a broad exhibition and a parallel conference and took place this year from 22 to 26 September in Frankfurt am Main.&lt;/p>
&lt;p>
&lt;figure id="figure-image-169-ecoc-2024-impressionshttpswwwecoc2024orgabout-ecocimpressions">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="ECOC Opening" srcset="
/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu13230516318362971037.webp 400w,
/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu17032873120562107944.webp 760w,
/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu2388086254709085923.webp 1200w"
src="/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu13230516318362971037.webp"
width="760"
height="507"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: &lt;a href="https://www.ecoc2024.org/about-ecoc/impressions/" target="_blank" rel="noopener">ECOC 2024 IMPRESSIONS&lt;/a>
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>2 Jobs for Student Assistants</title><link>/post/2024-07-30-offering-hiwi/</link><pubDate>Tue, 30 Jul 2024 04:12:53 +0000</pubDate><guid>/post/2024-07-30-offering-hiwi/</guid><description>&lt;p>Wir bieten zwei Stellen für studentische Hilfskräfte. Obwohl beide Tätigkeiten einen Bezug zu IT-Sicherheit und unserem Forschungsfeld &lt;em>Quantum Key Distribution Networks&lt;/em> haben, unterscheiden sich die Aufgaben stark. Wenn Du Dinge gut Ordnen und Strukturieren kannst und ein kleines Organisationstalent bist, kannst du gerne versuchen, für Ordnung in unseren Literaturdschungel zu sorgen. Wenn du eher Typ Programmierer und Tüftler bist, darfst Du dich an unseren Prototypen wagen.&lt;/p>
&lt;p>Unten findest Du die Links zu unseren Angeboten. Melde Dich bei Interesse gerne per Mail bei &lt;a href="https://ucs.h-da.io/author/johanna-henrich/" target="_blank" rel="noopener">Johanna Henrich&lt;/a>.&lt;/p>
&lt;p>Wir freuen uns auf Dich.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>&lt;a href="https://ucs.h-da.io/offerings/2024-07-hiwi-sok-qkdn//" target="_blank" rel="noopener">Systematization of Knowledge (SoK): Architecture and Communication Patterns in QKD Networks&lt;/a>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;a href="https://ucs.h-da.io/offerings/2024-07-hiwo-qkdn-prototype//" target="_blank" rel="noopener">Prototype development and benchmarking for secure key forwarding in QKDN&lt;/a>&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>&lt;em>English:&lt;/em>&lt;/p>
&lt;p>&lt;em>We offer two positions for student assistants. Although both jobs are related to IT security and our research area Quantum Key Distribution Networks, the tasks are quite different. If you are good at organizing and structuring things and have a talent for keeping things tidy, you are welcome to try to keep our literature jungle in order. If you are more of a programmer and tinkerer, you can try your hand at our prototype.&lt;/em>&lt;/p>
&lt;p>&lt;em>Below you will find the links to our offers. If you are interested, please send an email to &lt;a href="https://ucs.h-da.io/author/johanna-henrich/" target="_blank" rel="noopener">Johanna Henrich&lt;/a>.&lt;/em>&lt;/p>
&lt;p>&lt;em>We are looking forward to hearing from you.&lt;/em>&lt;/p>
&lt;ol>
&lt;li>
&lt;p>&lt;em>&lt;a href="https://ucs.h-da.io/offerings/2024-07-hiwi-sok-qkdn//" target="_blank" rel="noopener">Systematization of Knowledge (SoK): Architecture and Communication Patterns in QKD Networks&lt;/a>&lt;/em>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;em>&lt;a href="https://ucs.h-da.io/offerings/2024-07-hiwo-qkdn-prototype//" target="_blank" rel="noopener">Prototype Development and Benchmarking for Secure Key Forwarding in QKDN&lt;/a>&lt;/em>&lt;/p>
&lt;/li>
&lt;/ol></description></item><item><title>PMMP-PQC Migration Management Process</title><link>/publication/2024-eicc-vonnethen-pmmp/</link><pubDate>Sun, 16 Jun 2024 05:02:36 +0000</pubDate><guid>/publication/2024-eicc-vonnethen-pmmp/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>Organizations have to plan on migrating to quantum-resilient cryptographic measures, also known as PQC. However, this is a difficult task, and to the best of our knowledge, there is no generalized approach to manage such a complex migration for cryptography used in IT systems that explicitly integrates into organizations’ steering mechanisms and control systems. We present PMMP, a risk-based process for managing the migration of organizations from classic cryptography to PQC and establishing crypto-agility. Having completed the initial design phase, as well as a theoretical evaluation, we now intend to promote PMMP. Practitioners are encouraged to join the effort in order to enable a comprehensive practical evaluation and further development.&lt;/p></description></item><item><title>Ways for confidential and authenticated hop-by-hop key establishment in QKDN</title><link>/publication/2023-gi-sicherheit-johanna-phd/</link><pubDate>Tue, 16 Apr 2024 04:47:14 +0000</pubDate><guid>/publication/2023-gi-sicherheit-johanna-phd/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>Asymmetric cryptography, specifically key exchange and digital signatures, enables secure
digital communication. However, sufficiently powerful Quantum Computers, which could
be available within a few years , would be able to break classical primitives like
Elliptic-Curve Diffie–Hellman (ECDH) and RSA in polynomial time. Moreover, the
„harvest-then-decrypt“-attack poses the danger that stored encrypted data can be
decrypted later. Thus, alternative approaches are urgently needed. Besides Post Quantum
Cryptography (PQC), which is based on mathematical problems, Quantum Key
Distribution (QKD) uses quantum effects, to establish keys in an information-theoretically
secure way. Nevertheless, there are no reliable QKD modules that bridge distances
of more than 150 km. Therefore, a QKD Network (QKDN) uses a concatenation of
QKD links. End users are connected to each other via a series of QKD nodes performing
a hop-by-hop key forwarding. All nodes involved have access to the final shared secret.
If a node cannot be trusted the security of the system is no longer guaranteed. Physical
protection or key hybridization can mitigate this risk, where hybridization refers to the
combination of QKD and PQC. By using both schemes appropriately, the security objectives
are met as long as at least one of the schemes used has not been compromised.
Nonetheless, there is a lack of concrete concepts and analyzes to enable a secure and
efficient key forwarding process. In the following, ’secure’ implies the security objectives of
confidentiality and authenticity. ’Efficient’ refers to the time taken to complete the process,
the amount of data transferred and the amount of computing required. The analyses available
often only consider specific sub-processes, e.g., forwarding between two directly adjacent
nodes. The integration into the entire system and its resulting effects are disregarded. A
systematic comparison of different options is missing. When implementing a QKDN, it is
unclear which variant is suitable for one’s own intentions. This PhD project aims to address
the problem by defining the key establishment process, analyzing security requirements,
designing and implementing corresponding schemes, and evaluating these approaches.&lt;/p></description></item><item><title>On Criteria and Tooling for Cryptographic Inventories</title><link>/publication/2024-gi-sicherheit-schmitt-cdt/</link><pubDate>Tue, 09 Apr 2024 05:01:40 +0000</pubDate><guid>/publication/2024-gi-sicherheit-schmitt-cdt/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>When cryptography becomes insecure, a migration to new schemes is required. Often the migration process is very complicated, but the time available is very limited. Only if the used cryptographic algorithms, protocols and configurations are known can a system be efficiently and fully adapted to changed security situations. This creates the need for a crypto-inventory that gathers this knowledge. Consequently, the question arises what criteria a crypto-inventory must fulfill to support this adaptation. It also highlights the need for tools to assist compilation. We therefore conducted a literature survey and extracted key requirements. Missing content was supplemented by expanding existing requirements or adding new ones. Furthermore, appropriate metrics were assigned to assess the fulfillment of the requirements for a certain crypto-inventory implementation. Regarding the tooling, we identified five major areas of interest — installed software, connected hardware, communication, stored data and source code scanning — and provide prototypes for semi-automatic creation of crypto-inventories for three of them. This provides organizations with a starting point to understand their cryptographic landscape as a prerequisite for crypto-agility and crypto-migration. However, theoretical design and prototypes have not yet been evaluated. This will be done as a follow-up to this work. All types of organizations are invited to participate.&lt;/p></description></item><item><title>Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics</title><link>/publication/2023-infosec-henrich-pqc-kem/</link><pubDate>Fri, 16 Jun 2023 05:00:35 +0000</pubDate><guid>/publication/2023-infosec-henrich-pqc-kem/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>Widely used asymmetric primitives such as RSA or Elliptic Curve Diffie Hellman (ECDH), which enable authentication and key exchange, could be broken by Quantum Computers (QCs) in the coming years. Quantum-safe alternatives are urgently needed. However, a thorough investigation of these schemes is crucial to achieve sufficient levels of security, performance, and integrability in different application contexts. The integration into Transport Layer Security (TLS) plays an important role, as this security protocol is used in about 90% of today’s Internet connections and relies heavily on asymmetric cryptography. In this work, we evaluate different Post Quantum Cryptography (PQC) key establishment schemes in TLS 1.3 by extending the framework of Paquin et al.. We analyze the TLS handshake performance under variation of network parameters such as packet loss. This allows us to investigate the suitability of PQC KEMs in specific application contexts. We observe that Kyber and other structured lattice-based algorithms achieve very good overall performance and partially beat classical schemes. Other approaches such as FrodoKEM, HQC and BIKE show individual disadvantages. For these algorithms, there is a clear performance decrease when increasing the security level or using a hybrid implementation, e.g., a combination with ECDH. This is especially true for FrodoKEM, which, however, meets high security requirements in general. It becomes clear that performance is strongly influenced by the underlying network processes, which must be taken into account when selecting PQC algorithms.&lt;/p></description></item><item><title>Best Poster Award at EICC 2023</title><link>/post/2023-06-poster-eicc/</link><pubDate>Thu, 15 Jun 2023 00:00:00 +0000</pubDate><guid>/post/2023-06-poster-eicc/</guid><description>&lt;p>Our poster contribution to the EICC2023 titled &amp;ldquo;Crytpo-agile Design and Testbed for QKD-Networks&amp;rdquo; by Johanna Henrich, Andreas Heinemann, Martin Stiemerling &amp;amp; Fabian Seidl was honored with the best poster award.&lt;/p>
&lt;p>
&lt;figure id="figure-group-photo">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Group photo" srcset="
/post/2023-06-poster-eicc/group_hu3733658338992802588.webp 400w,
/post/2023-06-poster-eicc/group_hu6515095651612886417.webp 760w,
/post/2023-06-poster-eicc/group_hu10510738062189006190.webp 1200w"
src="/post/2023-06-poster-eicc/group_hu3733658338992802588.webp"
width="729"
height="591"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Group photo
&lt;/figcaption>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure id="figure-johanna">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Johanna" srcset="
/post/2023-06-poster-eicc/johanna_hu7272527927102725640.webp 400w,
/post/2023-06-poster-eicc/johanna_hu10170461419800617504.webp 760w,
/post/2023-06-poster-eicc/johanna_hu12843555640151551165.webp 1200w"
src="/post/2023-06-poster-eicc/johanna_hu7272527927102725640.webp"
width="518"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Johanna
&lt;/figcaption>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure id="figure-clapclap">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt=":clap::clap:" srcset="
/post/2023-06-poster-eicc/award_hu10868795050609259948.webp 400w,
/post/2023-06-poster-eicc/award_hu16040973108183256703.webp 760w,
/post/2023-06-poster-eicc/award_hu16008767723376865621.webp 1200w"
src="/post/2023-06-poster-eicc/award_hu10868795050609259948.webp"
width="760"
height="519"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
&amp;#x1f44f;&amp;#x1f44f;
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Crypto-Agile Design and Testbed for QKD-Networks</title><link>/publication/2023-eicc-henrich-demoquandt/</link><pubDate>Thu, 15 Jun 2023 00:00:00 +0000</pubDate><guid>/publication/2023-eicc-henrich-demoquandt/</guid><description>&lt;!-- Supplementary notes can be added here, including [code and math](https://sourcethemes.com/academic/docs/writing-markdown-latex/). -->
&lt;p>
&lt;figure id="figure-eicc-23-poster">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Poster at EICC 2023" srcset="
/publication/2023-eicc-henrich-demoquandt/2023-06-05-Poster-DemoQuanDT-HDa_hu15488436634616913026.webp 400w,
/publication/2023-eicc-henrich-demoquandt/2023-06-05-Poster-DemoQuanDT-HDa_hu9722245978835938748.webp 760w,
/publication/2023-eicc-henrich-demoquandt/2023-06-05-Poster-DemoQuanDT-HDa_hu1713607176767192103.webp 1200w"
src="/publication/2023-eicc-henrich-demoquandt/2023-06-05-Poster-DemoQuanDT-HDa_hu15488436634616913026.webp"
width="508"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
EICC &amp;lsquo;23 Poster
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Performanz Evaluation von PQC in TLS 1.3 unter variierenden Netzwerkcharakteristiken</title><link>/theses/2022-henrich/</link><pubDate>Wed, 23 Feb 2022 00:00:00 +0000</pubDate><guid>/theses/2022-henrich/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>The used cryptographic primitives rely on the computational difficulty of certain mathematical problems. In the last years there has been much research on quantum computers which could be able to efficiently solve these problems in future years. Especially asymmetric primitives, used for authentication and key exchange could be broken. The affected algorithms are actually used within many internet protocols and applications and quantum-safe alternatives are urgently needed. NIST started a process to find and standardize quantum-safe digital signature schemes and key establishment schemes, but the candidates and alternatives come along with specific characteristics and differ from classical proceedings. So, besides analyzing the security of these new algorithms, it is also necessary to evaluate their performance and integrability into existing infrastructures and applications. Especially the integration into TLS protocol, used within about 90 percent of today&amp;rsquo;s internet connections, plays an important role. The current version 1.3 uses the threatened asymmetric primitives for both, digital signatures and key establishment.&lt;/p>
&lt;p>In this work, NIST candidates and alternatives for quantum-safe key establishment were evaluated while using them within TLS 1.3. The focus was on analyzing the performance trend while changing certain network parameters like rate or packetloss and examining the suitability of the PQC algorithms under different network scenarios and in the entire application context. To achieve this, the framework of &lt;a href="https://doi.org/10.1007/978-3-030-44223-1_5" target="_blank" rel="noopener">Paquin, Stebila, and Tamvada&lt;/a> was extended to emulate various network conditions while frequently establishing a TLS 1.3 connection and measuring handshake duration.&lt;/p>
&lt;p>Among our key results, we observe that on the one hand the evaluated candidates Kyber, Saber and NTRU as well as the alternative NTRU Prime achieve very good overall performance and partially beat the classical ECDH. Choosing a higher security level or hybrid versions does not have a significant impact to the handshake times. On the other hand the alternatives FrodoKEM, HQC, SIKE and BIKE show individual disadvantages and the performance is linked to the used security level and variant. This applies in particular to FrodoKEM. SIKE seems to be a worthwhile alternative in specific circumstances, like rates less than 2 Mbps, due to its small key and ciphertext sizes. In general, network conditions should be taken into account while choosing the algorithm and parameter set. Furthermore, it becomes clear that the handshake performance dependents on numerous factors, like TCP mechanisms and MTU, which could compensate the disadvantages of PQC or make them obsolete.&lt;/p></description></item></channel></rss>