<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>PQC | UCS</title><link>/tag/pqc/</link><atom:link href="/tag/pqc/index.xml" rel="self" type="application/rss+xml"/><description>PQC</description><generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>en-us</language><lastBuildDate>Wed, 03 Sep 2025 00:00:00 +0000</lastBuildDate><image><url>/media/logo_hu12465375348167678909.png</url><title>PQC</title><link>/tag/pqc/</link></image><item><title>Two papers accepted at ISC 2025</title><link>/post/2025-09-09-paper-isc/</link><pubDate>Wed, 03 Sep 2025 00:00:00 +0000</pubDate><guid>/post/2025-09-09-paper-isc/</guid><description>&lt;p>Two papers from our working group have been accepted at &lt;a href="https://isc25.skku.edu/accepted-papers/" target="_blank" rel="noopener">ISC 2025&lt;/a>.&lt;/p>
&lt;p>Our first paper &amp;ldquo;Simulation-based Software Leakage Evaluation for the RISC-V Platform&amp;rdquo; by Nicolai Schmitt, Jannik Zeitschner (Ruhr Universität Bochum) and Andreas Heinemann extends a tool (PROLEAD_SW) for the RISC-V platform in order to detect leakage.&lt;/p>
&lt;p>Our second paper &amp;ldquo;A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?&amp;rdquo; by Johanna Henrich, Nicolai Schmitt, Nouri Alnahawi and Andreas Heinemann investigates the TLS handshake performance when using PQC schemes.&lt;/p></description></item><item><title>Nationale Konferenz IT-Sicherheitsforschung 2025</title><link>/post/2025-03-17-bmbf-konf-berlin/</link><pubDate>Sun, 16 Mar 2025 00:00:00 +0000</pubDate><guid>/post/2025-03-17-bmbf-konf-berlin/</guid><description>&lt;p>UCS will present the results of the DemoQuanDT research project in a poster session at the &lt;a href="https://www.forschung-it-sicherheit-kommunikationssysteme.de/service/termine/nationale-konferenz-it-sicherheitsforschung-2025" target="_blank" rel="noopener">&amp;ldquo;National Conference IT Security Research 2025 - IT Security and Democracy&amp;rdquo;&lt;/a> in Berlin, which is being hosted by the German Federal Ministry of Education and Research (BMBF).&lt;/p>
&lt;p>The presentation will be based on a poster entitled &amp;ldquo;Confidential and authenticated key forwarding in QKD networks,&amp;rdquo; which has been accepted for the poster pitch on March 18, 2025. The central inquiry concerns the extent to which security and performance can be assured for key forwarding in extensive, interconnected QKD networks. The technology is poised to facilitate secure transmission of messages, that is, confidentiality and authentication. In contradistinction to the asymmetric cryptographic approaches currently employed, the security of the QKD system is expected to withstand the threat posed by quantum computers.&lt;/p>
&lt;p>The poster was authored by Johanna Henrich. Her research focuses on key establishment in QKD networks and the potential for integrating QKD and PQC to ensure quantum-safe and high-performance communication. The research is conducted in close collaboration with the &lt;a href="https://danet.h-da.io/" target="_blank" rel="noopener">danet research group&lt;/a> led by Prof. Dr Martin Stiemerling.&lt;/p>
&lt;p>
&lt;figure id="figure-image-169-national-conference-it-security-research-2025httpswwwforschung-it-sicherheit-kommunikationssystemedeserviceterminenationale-konferenz-it-sicherheitsforschung-2025">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="National Conference IT Security Research 2025" srcset="
/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu13903682880246765859.webp 400w,
/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu2897823824235519899.webp 760w,
/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu11718390987991694070.webp 1200w"
src="/post/2025-03-17-bmbf-konf-berlin/bmbf-konf-2025_hu13903682880246765859.webp"
width="760"
height="397"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: &lt;a href="https://www.forschung-it-sicherheit-kommunikationssysteme.de/service/termine/nationale-konferenz-it-sicherheitsforschung-2025" target="_blank" rel="noopener">National Conference IT Security Research 2025&lt;/a>
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>SATURN</title><link>/project/saturn/</link><pubDate>Wed, 01 Jan 2025 00:00:00 +0000</pubDate><guid>/project/saturn/</guid><description>&lt;p>The SATURN project addresses critical security challenges in Quantum Key Distribution Networks (QKDN). With the development of quantum computers, the threat to classical cryptography is growing, making quantum-safe alternatives essential. Particularly critical are &amp;lsquo;harvest now, decrypt later&amp;rsquo; attacks, where encrypted data is stored today to be decrypted later by quantum computers. While QKD enables secure key exchange from an information-theoretic point of view, its practical implementation in networks poses major challenges. Current QKD modules over optical fibre are limited to distances of about 150 km. For longer distances, intermediate nodes must be used, which raises new security issues.&lt;/p>
&lt;p>The SATURN project will develop secure and efficient protocols for key forwarding in QKDNs. A hybrid approach will be pursued, combining QKD with post-quantum cryptography (PQC). Existing protocols will be formally analysed, new security models will be developed, and practical implementation guidelines will be produced. The results should provide an informed decision-making framework for the use of QKDNs, taking into account both security and practical aspects such as performance, scalability and crypto-agility.&lt;/p>
&lt;h4 id="contact">Contact&lt;/h4>
&lt;p>&lt;a href="/author/johanna-henrich">Johanna Henrich&lt;/a>&lt;/p></description></item><item><title>IETF Meeting 121 in Dublin</title><link>/post/2024-11-01-ietf-meeting-121-dublin/</link><pubDate>Thu, 24 Oct 2024 00:00:00 +0000</pubDate><guid>/post/2024-11-01-ietf-meeting-121-dublin/</guid><description>&lt;p>UCS took part in the &lt;a href="https://www.ietf.org/meeting/121/" target="_blank" rel="noopener">121st meeting of the Internet Engineering Task Force (IETF) in Dublin&lt;/a> from 2.-8. November 2024. The IETF develops standards and best practices for the Internet and thus has a significant influence on its design.&lt;/p>
&lt;p>Among other things, Johanna Henrich led a project group together with the &lt;a href="https://danet.h-da.io/" target="_blank" rel="noopener">&lt;em>danet&lt;/em>&lt;/a> research group of Prof. Dr. Martin Stiemerling. The project was part of the &lt;a href="https://www.ietf.org/meeting/hackathons/121-hackathon/" target="_blank" rel="noopener">Hackathon&lt;/a>, which took place from 2.-3. November. The aim was to find out how the interfaces in Quantum Key Distribution Networks (QKDN) can be designed and how quantum-resistant protection of their communication can be achieved. Read more in our &lt;a href="https://datatracker.ietf.org/meeting/121/materials/slides-121-hackathon-sessd-protocols-for-quantum-key-distribution-networks-qkdn-00" target="_blank" rel="noopener">final presentation&lt;/a>.&lt;/p>
&lt;p>In addition, Johanna Henrich participated in various IETF and IRTF working group sessions throughout the week to answer questions such as how post-quantum cryptography (PQC) and QKD, individually and in hybrid form, can be integrated into the existing Internet infrastructure.&lt;/p>
&lt;p>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="H_da@IETF121" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu750836535530113213.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu16660504106634181873.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu4076067445614435600.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin1_hu750836535530113213.webp"
width="760"
height="683"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Dublin Convention Center" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu2475273792349512832.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu17787974089270791007.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu5725797291102983458.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin2_hu2475273792349512832.webp"
width="760"
height="570"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Hackaton@IETF121" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu18262922610363661176.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu15313571835690591437.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu14090310200751563479.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin3_hu18262922610363661176.webp"
width="678"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;figure id="figure-image-169-johanna-henrich">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Dublin impressions" srcset="
/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu11480959661179178800.webp 400w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu2861291465665790847.webp 760w,
/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu14462442235763723863.webp 1200w"
src="/post/2024-11-01-ietf-meeting-121-dublin/dublin4_hu11480959661179178800.webp"
width="760"
height="518"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: Johanna Henrich
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Rump Session at ECOC 2024</title><link>/post/2024-09-22-ecoc-rump-session/</link><pubDate>Thu, 24 Oct 2024 00:00:00 +0000</pubDate><guid>/post/2024-09-22-ecoc-rump-session/</guid><description>&lt;p>On 24 September 2024, Johanna Henrich accepted an invitation to take part in a rump session at the &lt;a href="https://www.ecoc2024.org/" target="_blank" rel="noopener">European Conference on Optical Communication (ECOC) 2024&lt;/a>. The session dealt with the pros and cons of post-quantum cryptography and quantum key distribution, and the extent to which they can be used in combination to reliably protect us from future attacks by quantum computers.&lt;/p>
&lt;p>ECOC is Europe&amp;rsquo;s leading conference on optical communications with representatives from science and research. It consists of a broad exhibition and a parallel conference and took place this year from 22 to 26 September in Frankfurt am Main.&lt;/p>
&lt;p>
&lt;figure id="figure-image-169-ecoc-2024-impressionshttpswwwecoc2024orgabout-ecocimpressions">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="ECOC Opening" srcset="
/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu13230516318362971037.webp 400w,
/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu17032873120562107944.webp 760w,
/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu2388086254709085923.webp 1200w"
src="/post/2024-09-22-ecoc-rump-session/ECOC-23Sep2024_hu13230516318362971037.webp"
width="760"
height="507"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Image ©: &lt;a href="https://www.ecoc2024.org/about-ecoc/impressions/" target="_blank" rel="noopener">ECOC 2024 IMPRESSIONS&lt;/a>
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Paper accepted at ISC 2023</title><link>/post/paper-isc-2023/</link><pubDate>Wed, 11 Oct 2023 00:00:00 +0000</pubDate><guid>/post/paper-isc-2023/</guid><description>&lt;p>Our paper &amp;ldquo;Performance Impact of PQC KEMs on TLS 1.3 under Varying Network
Characteristics&amp;rdquo; by Johanna Henrich, Andreas Heinemann, Alexander Wiesmaier and Nicolai Schmidt will be presented at the &lt;a href="https://isc23.cs.rug.nl/docs/home/" target="_blank" rel="noopener">26th Information Security Conference (ISC)&lt;/a> (ISC - 2023) on November 15/16/17th 2023, Groningen, Netherlands.&lt;/p>
&lt;p>This work is based on the results of Johanna Henrichs&amp;rsquo;s Master&amp;rsquo;s thesis.&lt;/p></description></item><item><title>Best Poster Award at EICC 2023</title><link>/post/2023-06-poster-eicc/</link><pubDate>Thu, 15 Jun 2023 00:00:00 +0000</pubDate><guid>/post/2023-06-poster-eicc/</guid><description>&lt;p>Our poster contribution to the EICC2023 titled &amp;ldquo;Crytpo-agile Design and Testbed for QKD-Networks&amp;rdquo; by Johanna Henrich, Andreas Heinemann, Martin Stiemerling &amp;amp; Fabian Seidl was honored with the best poster award.&lt;/p>
&lt;p>
&lt;figure id="figure-group-photo">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Group photo" srcset="
/post/2023-06-poster-eicc/group_hu3733658338992802588.webp 400w,
/post/2023-06-poster-eicc/group_hu6515095651612886417.webp 760w,
/post/2023-06-poster-eicc/group_hu10510738062189006190.webp 1200w"
src="/post/2023-06-poster-eicc/group_hu3733658338992802588.webp"
width="729"
height="591"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Group photo
&lt;/figcaption>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure id="figure-johanna">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Johanna" srcset="
/post/2023-06-poster-eicc/johanna_hu7272527927102725640.webp 400w,
/post/2023-06-poster-eicc/johanna_hu10170461419800617504.webp 760w,
/post/2023-06-poster-eicc/johanna_hu12843555640151551165.webp 1200w"
src="/post/2023-06-poster-eicc/johanna_hu7272527927102725640.webp"
width="518"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Johanna
&lt;/figcaption>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure id="figure-clapclap">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt=":clap::clap:" srcset="
/post/2023-06-poster-eicc/award_hu10868795050609259948.webp 400w,
/post/2023-06-poster-eicc/award_hu16040973108183256703.webp 760w,
/post/2023-06-poster-eicc/award_hu16008767723376865621.webp 1200w"
src="/post/2023-06-poster-eicc/award_hu10868795050609259948.webp"
width="760"
height="519"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
&amp;#x1f44f;&amp;#x1f44f;
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Crypto-Agile Design and Testbed for QKD-Networks</title><link>/publication/2023-eicc-henrich-demoquandt/</link><pubDate>Thu, 15 Jun 2023 00:00:00 +0000</pubDate><guid>/publication/2023-eicc-henrich-demoquandt/</guid><description>&lt;!-- Supplementary notes can be added here, including [code and math](https://sourcethemes.com/academic/docs/writing-markdown-latex/). -->
&lt;p>
&lt;figure id="figure-eicc-23-poster">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Poster at EICC 2023" srcset="
/publication/2023-eicc-henrich-demoquandt/2023-06-05-Poster-DemoQuanDT-HDa_hu15488436634616913026.webp 400w,
/publication/2023-eicc-henrich-demoquandt/2023-06-05-Poster-DemoQuanDT-HDa_hu9722245978835938748.webp 760w,
/publication/2023-eicc-henrich-demoquandt/2023-06-05-Poster-DemoQuanDT-HDa_hu1713607176767192103.webp 1200w"
src="/publication/2023-eicc-henrich-demoquandt/2023-06-05-Poster-DemoQuanDT-HDa_hu15488436634616913026.webp"
width="508"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
EICC &amp;lsquo;23 Poster
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Towards a maturity model for crypto-agility assessment</title><link>/publication/2023-fps-2022-hohm-camm/</link><pubDate>Sat, 01 Apr 2023 00:00:00 +0000</pubDate><guid>/publication/2023-fps-2022-hohm-camm/</guid><description>&lt;!-- Supplementary notes can be added here, including [code and math](https://sourcethemes.com/academic/docs/writing-markdown-latex/). --></description></item><item><title>LEAK</title><link>/project/leak/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid>/project/leak/</guid><description>&lt;p>The ATHENE Leak project addresses side-channel-analysis-attacks (SCA) by developing a so-called natural leakage model, that is closer to the hardware than standard leakage models and thereby more precise and effective.&lt;/p>
&lt;p>As full electrical simulations of complex hardware are usually to resource-intensive, common leakage models
abstract the hardware on the register-transfer-level (RTL) and are thereby much more resource-friendly during simulations.&lt;/p>
&lt;p>A natural leakage model combines the resource-friendliness with measured behavior of the hardware. Based on this model, the project aims to further adapt and develop performance-optimized countermeasures against SCA on PQC-Algorithms implemented on the RISC-V platform.&lt;/p>
&lt;p>The intended project results (a natural leakage models and optimizations) can be used to support hardware engineers during the development, hardening and testing of hardware-based security solutions. Thereby the number of prototypes before final rollout of new hardware will be reduced, speeding up the development process and saving costs in the development and hardening process.&lt;/p>
&lt;h4 id="contact">Contact&lt;/h4>
&lt;p>&lt;a href="/author/nicolai-schmitt">Nicolai Schmitt&lt;/a>&lt;/p></description></item><item><title>Paper accepted at FPS - 2022</title><link>/post/paper-fps-2022/</link><pubDate>Wed, 23 Nov 2022 00:00:00 +0000</pubDate><guid>/post/paper-fps-2022/</guid><description>&lt;p>Our paper &amp;ldquo;Towards a maturity model for crypto-agility assessment&amp;rdquo; by Julian Hohm, Andreas Heinemann and Alexander Wiesmaier will be presented at the &lt;a href="https://www.fps-2022.com" target="_blank" rel="noopener">15th International Symposium on Foundations &amp;amp; Practice of Security&lt;/a> (FPS - 2022) on December 12/13/14th 2022, Ottawa, Canada.&lt;/p>
&lt;p>This work is based on the results of Julian Hohm&amp;rsquo;s Master&amp;rsquo;s thesis. Check out more details on &lt;a href="https://camm.h-da.io" target="_blank" rel="noopener">CAMM&lt;/a>.&lt;/p></description></item><item><title>First Workshop of the EUT+ European Telecommunications and Networks Institute</title><link>/post/talk-eutplus-2022/</link><pubDate>Wed, 16 Mar 2022 00:00:00 +0000</pubDate><guid>/post/talk-eutplus-2022/</guid><description>&lt;p>On 15.03.2022 UCS took part in the first Workshop of the EUT+ European Telecommunications and Networks Institute.
The aim of this workshop was to offer an opportunity to all EUT+ partners to present their research activities related to Technologies and Services for Telecommunications.&lt;/p>
&lt;p>We contributed our research activities on PQC and network issues, especially the results of &lt;a href="/author/johanna-henrich/">Johanna&lt;/a>&amp;rsquo;s &lt;a href="/theses/2022-henrich/">master thesis&lt;/a>.&lt;/p></description></item><item><title>Performanz Evaluation von PQC in TLS 1.3 unter variierenden Netzwerkcharakteristiken</title><link>/theses/2022-henrich/</link><pubDate>Wed, 23 Feb 2022 00:00:00 +0000</pubDate><guid>/theses/2022-henrich/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>The used cryptographic primitives rely on the computational difficulty of certain mathematical problems. In the last years there has been much research on quantum computers which could be able to efficiently solve these problems in future years. Especially asymmetric primitives, used for authentication and key exchange could be broken. The affected algorithms are actually used within many internet protocols and applications and quantum-safe alternatives are urgently needed. NIST started a process to find and standardize quantum-safe digital signature schemes and key establishment schemes, but the candidates and alternatives come along with specific characteristics and differ from classical proceedings. So, besides analyzing the security of these new algorithms, it is also necessary to evaluate their performance and integrability into existing infrastructures and applications. Especially the integration into TLS protocol, used within about 90 percent of today&amp;rsquo;s internet connections, plays an important role. The current version 1.3 uses the threatened asymmetric primitives for both, digital signatures and key establishment.&lt;/p>
&lt;p>In this work, NIST candidates and alternatives for quantum-safe key establishment were evaluated while using them within TLS 1.3. The focus was on analyzing the performance trend while changing certain network parameters like rate or packetloss and examining the suitability of the PQC algorithms under different network scenarios and in the entire application context. To achieve this, the framework of &lt;a href="https://doi.org/10.1007/978-3-030-44223-1_5" target="_blank" rel="noopener">Paquin, Stebila, and Tamvada&lt;/a> was extended to emulate various network conditions while frequently establishing a TLS 1.3 connection and measuring handshake duration.&lt;/p>
&lt;p>Among our key results, we observe that on the one hand the evaluated candidates Kyber, Saber and NTRU as well as the alternative NTRU Prime achieve very good overall performance and partially beat the classical ECDH. Choosing a higher security level or hybrid versions does not have a significant impact to the handshake times. On the other hand the alternatives FrodoKEM, HQC, SIKE and BIKE show individual disadvantages and the performance is linked to the used security level and variant. This applies in particular to FrodoKEM. SIKE seems to be a worthwhile alternative in specific circumstances, like rates less than 2 Mbps, due to its small key and ciphertext sizes. In general, network conditions should be taken into account while choosing the algorithm and parameter set. Furthermore, it becomes clear that the handshake performance dependents on numerous factors, like TCP mechanisms and MTU, which could compensate the disadvantages of PQC or make them obsolete.&lt;/p></description></item><item><title>Towards a maturity model for crypto-agility assessment</title><link>/publication/2022-preprint-hohm-camm/</link><pubDate>Mon, 14 Feb 2022 00:00:00 +0000</pubDate><guid>/publication/2022-preprint-hohm-camm/</guid><description>&lt;!-- Supplementary notes can be added here, including [code and math](https://sourcethemes.com/academic/docs/writing-markdown-latex/). --></description></item><item><title>On the State of Crypto Agility</title><link>/publication/2022-bsi-alnahawi-crypto-agility/</link><pubDate>Tue, 01 Feb 2022 00:00:00 +0000</pubDate><guid>/publication/2022-bsi-alnahawi-crypto-agility/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>Cryptographic primitives and protocols require constant modifications and adaptations in order to maintain the security of IT-systems. Many researchers argue that applying the notion of crypto-agility provides more feasible and practical updating of cryptographic systems, especially in the light of the expected transition to PQC. However, there is no unified definition for this notion, nor a common understanding of the requirements that can enable it. Moreover, it is not entirely clear what measures need to be taken in order to apply crypto-agility in practice, and which aspects and challenges exist towards this endeavor. We compare the various definitions of crypto-agility including its requirements and varying facets, and investigate the state of readiness of crypto-agility by surveying works dealing with general challenges and recommendations in this regard. We present the survey and discuss discovered challenges and solutions and utilize our findings to evaluate the state of readiness for crypto-agility.&lt;/p></description></item><item><title>DemoQuanDT</title><link>/project/demoquandt/</link><pubDate>Sat, 01 Jan 2022 00:00:00 +0000</pubDate><guid>/project/demoquandt/</guid><description>&lt;p>DemoQuanDT is an application-oriented research project to demonstrate and investigate quantum communication networks by establishing an entire QKD route within the German telecommunication network. Connecting Berlin and Bonn over a link distance of 923 km, the project includes all necessary components, systems, and processes for carrier-grade quantum key distribution.&lt;/p>
&lt;p>The project addresses the growing threat that quantum computers pose to asymmetric cryptography used in everyday internet protocols. It investigates how to profitably combine Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and how to integrate both into existing communication protocols such as TLS. The overall objective is to develop reliable and usable protection against quantum computers, especially for critical infrastructures.&lt;/p>
&lt;h2 id="partners">Partners&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://www.telekom.de" target="_blank" rel="noopener">Deutsche Telekom&lt;/a> (Coordinator)&lt;/li>
&lt;li>&lt;a href="https://www.adesso.de" target="_blank" rel="noopener">adesso SE&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.genua.de" target="_blank" rel="noopener">genua GmbH&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.keequant.com" target="_blank" rel="noopener">KEEQuant GmbH&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.h-da.de" target="_blank" rel="noopener">Hochschule Darmstadt – University of Applied Sciences&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.lmu.de" target="_blank" rel="noopener">Ludwig-Maximilians-Universität München&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.aisec.fraunhofer.de" target="_blank" rel="noopener">Fraunhofer AISEC&lt;/a>&lt;/li>
&lt;/ul>
&lt;p>&lt;em>Funded by the German Federal Ministry of Education and Research (BMBF).&lt;/em>&lt;/p></description></item><item><title>Reifegradmodell für die Krypto-Agilität</title><link>/theses/2021-hohm/</link><pubDate>Tue, 26 Oct 2021 00:00:00 +0000</pubDate><guid>/theses/2021-hohm/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>Quantum computers threaten to fundamentally endanger the security of cryptography used today. In addition to the development of algorithms that are resistant to attacks by quantum computers, crypto-agility is an important field of research in order to be able to exchange algorithms in time and thus be safer from the impending danger. Since there is no general guideline describing how crypto-agility should be implemented for IT systems, this thesis conducts a literature study and aggregates the requirements from existing research to develop a maturity model. The resulting model fulfills the properties identified as necessary to facilitate a crypto-agile system design. The evaluation and improvement of the crypto-agile properties are successfully tested on the example of a real system. Positive feedback from potential users of the model is collected in an initial expert survey. By gaining popularity and through extensive usage, this model supports further research into crypto-agility and ensures the future security of today’s infrastructure by enabling the simple exchange of existing cryptography with PQC methods.&lt;/p></description></item><item><title>PQC Integration</title><link>/project/pqc/</link><pubDate>Wed, 01 Jan 2020 00:00:00 +0000</pubDate><guid>/project/pqc/</guid><description>&lt;p>Asymmetric cryptography, which is widely used everyday for authentication and key exchange in communication protocols, is threatened by the ongoing development of Quantum-Computers. Quantum Computers have the potential to defeat the security of classical algorithms like RSA or ECDH and break the underlying mathematical problems within the next view years. To further ensure security, the National Institute of Standards and Technology (NIST) started a process in 2016 to find novel, quantum-resistant algorithms (PQC) for execution on classical computers, equivalent to the classical ones. These novel algorithms have to be accessable to software-developers as well as beeing tested and integrated into existing software.&lt;/p>
&lt;p>The PQC-Integration-Project develops concepts for easy and safe integration of quantum-safe cryptography with a focus on crypto-agility. Further research aspects are performance in real-world applications, usability &amp;ndash; including safe and easy to use API&amp;rsquo;s, as well as concepts to migrate large infrastructures.&lt;/p></description></item></channel></rss>