scholarly journals Post-quantum MACsec in Ethernet Networks

Author(s):  
Joo Yeon Cho ◽  
Andrew Sergeev

The demand on MACsec in Ethernet is increasing substantially since MACsec fits well for industrial applications which require strong security as well as efficiency. To provide a long-term security, the MACsec protocol should be resistant to future attacks including quantum attacks. In this paper, MACsec is analysed under a quantum attack scenario. To achieve 128-bit quantum security, AES (Advanced Encryption Standard) algorithms defined in MACsec should mandate to use 256-bit keys. On the other hand, classical public-key cryptosystems in MKA are not secure at all against quantum attacks so that they need to be replaced by post-quantum crypto schemes in a quantum world. We propose an authenticated post-quantum key establishment protocol which is suitable for long-term secure MACsec. The proposed protocol is used in the hybrid mode, an ephemeral key exchange, and an end-to-end encryption. We verified by experiments that the proposed protocol can be deployed in existing a MACsec-enabled Ethernet network.

Author(s):  
Kannan Balasubramanian ◽  
Mala K.

This chapter focusses on Secure Key Exchange protocols executed among a group of parties, called group key exchange (GKE) protocols. Authentication and Key Establishment are very important in any secure communication. Authentication is generally based on long-term keys which can be associated with identities. To associate identities with long-term keys, we can assume the existence of a public-key infrastructure (PKI) which provides parties with some mechanisms for secure key registration and secure access to long-term keys of prospective peers. In most cases, there is also a need for some temporary keys. The Group Key Exchange protocols can be classified as Centralized, Distributed or Contributory. A few toolkits such as Spread and Cliques for the implementation of Group Key Exchange Protocols are also discussed.


Radiotekhnika ◽  
2021 ◽  
pp. 66-72
Author(s):  
E.V. Kotukh ◽  
O.V. Severinov ◽  
A.V. Vlasov ◽  
A.O. Tenytska ◽  
E.O. Zarudna

Implementation of a successful attack on classical public key cryptosystems becomes more and more real with the advent of practical results in the implementation of Shor's and Grover's algorithms on quantum computers. Modern results in tackling the problem of building a quantum computer of sufficiently power justify the need to revise the existing approaches and determine the most effective in terms of solving problems of post-quantum cryptography. One of these promising research priorities is the study of the cryptosystems based on non-abelian groups. The problems of conjugacy search, membership search, and others are difficult to solve in the theory of non-abelian groups and are the basis for building provably secure public key cryptosystems. This paper gives an overview of the most frequently discussed algorithms using non-abelian groups: matrix groups braid groups, semi direct products, and algebraic erasers (AE). The analysis of the construction of encryption and decryption schemes, key establishment mechanisms is given. Many non-abelian group-based key establishment protocols are associated with the Diffie – Hellman (DH) protocol. The paper analyzes the properties of non-abelian group public key encryption schemes. Various cryptographic primitives using non-commutative groups as a basis for post-quantum schemes are considered.


2015 ◽  
Vol 4 (1) ◽  
pp. 73-82 ◽  
Author(s):  
Chandrashekhar Meshram

Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public key file is not required. Since new cryptographic schemes always face security challenges and many integer factorization problem and discrete logarithm based cryptographic systems have been deployed, therefore, the purpose of this paper is to design practical IBC using hybrid mode problems factoring and discrete logarithm. We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.


Author(s):  
Keith M. Martin

In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.


Author(s):  
Gaurav Mittal ◽  
Sunil Kumar ◽  
Shiv Narain ◽  
Sandeep Kumar

Author(s):  
Seremak Wioletta ◽  
Baszczuk Agnieszka ◽  
Jasiorski Marek ◽  
Gibas Anna ◽  
Winnicki Marcin

AbstractThis work shows that the titanium dioxide coatings obtained by low-pressure cold gas spraying with the use of the sol–gel amorphous TiO2 powder are characterized by photocatalytic activity despite their partial amorphous content. Moreover, the research outcome suggests that the decomposition rate of organic pollutants is enhanced after long-term exposure to moisture. The condensation humidity test is not detrimental to the continuity and integrity of the coating, but the phase composition of coatings changes—with the exposure to water vapor, the portion of the amorphous phase crystallizes into brookite. The mechanism responsible for the conversion of amorphous TiO2 into brookite is attributed to the water-driven dissolution and reprecipitation of TiO6 octahedra. It has been shown that an additional parameter necessary for the stabilization of the brookite is the oxygen depletion of the amorphous structure of titanium dioxide. Considering the results presented in this paper and the advantages of a portable, low-pressure cold spray system for industrial applications, it is expected that TiO2 coatings produced from a sol–gel feedstock powder can be further developed and tested as efficient photocatalysts.


Author(s):  
RANI SIROMONEY ◽  
K. G. SUBRAMANIAN ◽  
P. J. ABISHA

Language theoretic public key cryptosystems for strings and pictures are discussed. Two methods of constructing public key cryptosystems for the safe transmission or storage of chain code pictures are presented; the first one encrypts a chain code picture as a string and the second one as a two-dimensional array.


Sign in / Sign up

Export Citation Format

Share Document