UTFacultiesEEMCSDisciplines & departmentsSCSEducationAssignmentsOpen AssignmentsOpen Master AssignmentsMay 29, 2023: Post-Quantum Cryptography: Exploring New Paradigms for Secure Communication in the Quantum Era

May 29, 2023: Post-Quantum Cryptography: Exploring New Paradigms for Secure Communication in the Quantum Era

MAster assignment

Post-Quantum Cryptography: Exploring New Paradigms for Secure Communication in the Quantum Era

TYPE : MASTER CS

Period: Start date: as soon as possible

Student: Unassigned

If you are interested please contact:

Abstract:

This master's thesis aims to explore post-quantum cryptography, a hot-topic in the field of cryptography that addresses the security challenges posed by quantum computers. The research will involve studying the impact of quantum computing on existing cryptographic algorithms and investigating new paradigms and approaches for secure communication in the quantum era. The objective is to propose and evaluate post-quantum cryptographic schemes that offer robust security while considering their practicality and efficiency. The study will contribute to the development of cryptographic solutions that can withstand attacks from both classical and quantum adversaries.

Objective:

  1. The primary objective of this research is to explore post-quantum cryptography and propose secure and efficient cryptographic schemes for secure communication in the quantum era. The specific objectives include:
  2. Understanding the fundamentals of quantum computing and its implications for cryptography.
  3. Analyzing the vulnerabilities of existing cryptographic algorithms to attacks from quantum computers.
  4. Investigating new paradigms and approaches in post-quantum cryptography, such as lattice-based, code-based, or multivariate cryptographic schemes.
  5. Designing and evaluating post-quantum cryptographic schemes in terms of security, efficiency, and practicality.
  6. Exploring potential deployment scenarios and assessing the interoperability of post-quantum cryptographic schemes with existing cryptographic infrastructure.

 Methodology:

  1. Literature Review: Conduct an extensive review of literature and research papers on quantum computing, post-quantum cryptography, quantum-resistant algorithms, and the vulnerabilities of existing cryptographic schemes to quantum attacks. Identify key research gaps and areas for exploration.
  2. Analysis of Existing Cryptographic Algorithms: Study the vulnerabilities of widely used cryptographic algorithms, such as RSA, ECC, and symmetric encryption algorithms, to attacks from quantum computers. Understand the impact of quantum computing on their security assumptions and evaluate the urgency for post-quantum cryptographic solutions.
  3. Post-Quantum Cryptographic Schemes: Explore new paradigms and approaches in post-quantum cryptography, such as lattice-based, code-based, or multivariate cryptographic schemes. Understand their underlying mathematics and security assumptions. Analyze their resistance to quantum attacks and assess their suitability for practical deployment.
  4. Scheme Design and Evaluation: Design and implement post-quantum cryptographic schemes that offer robust security against both classical and quantum adversaries. Evaluate their security, efficiency, and practicality in terms of factors such as computational overhead, key size, and performance. Conduct extensive testing and analysis to measure their resistance against known attacks.
  5. Interoperability and Deployment Considerations: Investigate the interoperability of post-quantum cryptographic schemes with existing cryptographic infrastructure and protocols. Analyze potential deployment scenarios, such as secure communication protocols, digital signatures, or key exchange mechanisms. Assess the practical feasibility and integration challenges of post-quantum cryptographic schemes in real-world applications.
  6. Comparative Analysis and Evaluation: Compare the performance, security, and practicality of the proposed post-quantum cryptographic schemes with existing cryptographic algorithms. Assess their advantages, limitations, and potential trade-offs. Provide insights into the potential adoption and migration strategies for post-quantum cryptography in various domains.

Expected Outcome:

The expected outcome of this research is a comprehensive understanding of post-quantum cryptography and the proposal of secure and efficient cryptographic schemes for secure communication in the quantum era. The thesis will contribute to the development of cryptographic solutions that can withstand attacks from both classical and quantum adversaries. The findings will aid in the transition towards post-quantum cryptography, ensuring the long-term security of sensitive information in an era of quantum computers.

References:

  1. Bernstein, D. J., Lange, T., & Peters, C. (2017). Post-Quantum Cryptography. Nature, 549(7671), 188-195. DOI: 10.1038/nature23461
  2. Alagic, G., Mosca, M., & Lutomirski, P. (2020). Post-Quantum Cryptography Standardization. Nature Electronics, 3(1), 16-18. DOI: 10.1038/s41928-019-0346-4
  3. Peikert, C. (2016). A Decade of Lattice Cryptography. Foundations and Trends in Theoretical Computer Science, 10(4), 283-424. DOI: 10.1561/0400000079
  4. Pöppelmann, T., & Schwabe, P. (2020). Classic McEliece: New Options for a Post-Quantum World. In International Workshop on Post-Quantum Cryptography (pp. 3-24). Springer. DOI: 10.1007/978-3-030-36574-2_1

Detailed Methodology:

Scheme Design and Evaluation

In the context of post-quantum cryptographic schemes, you can follow the following detailed steps:

1.      Understand Post-Quantum Cryptography:

2.      Select Cryptographic Schemes:

3.      Design and Implementation:

4.      Security Evaluation:

5.      Efficiency and Performance Analysis:

6.      Testing and Analysis:

7.      Comparison and Evaluation:

8.      Documentation and Reporting:

By following these steps, you can design and evaluate post-quantum cryptographic schemes, considering factors such as security, efficiency, and practicality.