All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F24%3APU151731" target="_blank" >RIV/00216305:26220/24:PU151731 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.scitepress.org/PublicationsDetail.aspx?ID=8jUQgq8nzaI%3d&t=1" target="_blank" >https://www.scitepress.org/PublicationsDetail.aspx?ID=8jUQgq8nzaI%3d&t=1</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.5220/0012839200003767" target="_blank" >10.5220/0012839200003767</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment

  • Original language description

    This article describes an open-source quantum-resistant network traffic encryptor for the Linux platform. Our encryptor uses a combination of quantum and post-quantum key establishment methods to achieve quantum resistance combined with a fast encryption speed of AES to make quantum-resistant encryption readily available to the public. The packet-by-packet encryption architecture ensures that every bit of information is properly authenticated and encrypted. The combination of multiple key sources further increases the encryptor’s security – be it elliptic curve-based (Elliptic Curve Diffie Hellman, ECDH), quantum (Quantum Key Distribution, QKD) or post-quantum (CRYSTALS-Kyber). Without knowing all the keys obtained from different types of key sources, the final hybrid encryption key can only be obtained by brute-force means. Our contribution is very practical as the encryptor has reasonable performance, despite not being part of the Linux kernel.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

    <a href="/en/project/VJ01010008" target="_blank" >VJ01010008: Network Cybersecurity in Post-Quantum Era</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2024

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024)

  • ISBN

    978-989-758-709-2

  • ISSN

    2184-7711

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

    826-831

  • Publisher name

    SciTePress

  • Place of publication

    neuveden

  • Event location

    Dijon, France

  • Event date

    Jul 8, 2024

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article