QSOR: Quantum-Safe Onion Routing

01/10/2020
by   Zsolt Tujner, et al.
0

In this work, we propose a study on the use of post-quantum cryptographic primitives for the Tor network in order to make it safe in a quantum world. With this aim, the underlying keying material has first been analysed. We observe that breaking the security of the algorithms/protocols that use long- and medium-term keys (usually RSA keys) have the highest impact in security. Therefore, we investigate the cost of quantum-safe variants. These include key generation, key encapsulation and decapsulation. Six different post-quantum cryptographic algorithms that ensure level 1 NIST security are evaluated. We further target the Tor circuit creation operation and evaluate the overhead of the post-quantum variant. This comparative study is performed through a reference implementation based on SweetOnions that simulates Tor with slight simplifications. We show that a quantum-safe Tor circuit creation is possible and suggest two versions - one that can be used in a purely quantum-safe setting, and one that can be used in a hybrid setting.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/02/2022

Authentication of quantum key distribution with post-quantum cryptography and replay attacks

With the development of quantum computers, traditional cryptographic sys...
research
01/19/2022

A 334uW 0.158mm^2 Saber Learning with Rounding based Post-Quantum Crypto Accelerator

National Institute of Standard Technology (NIST) is currently runnin...
research
03/27/2023

Performanz Evaluation von PQC in TLS 1.3 unter variierenden Netzwerkcharakteristiken

Quantum computers could break currently used asymmetric cryptographic sc...
research
10/13/2020

PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks

Hyperledger Fabric is a prominent and flexible solution for building per...
research
11/09/2017

Yuen's Criticisms on Security of Quantum Key Distribution and Onward

Quantum Key Distribution (QKD) has been attracting researchers that it w...
research
07/13/2023

Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis

Quantum computing is emerging as an unprecedented threat to the current ...
research
07/24/2023

Quantum key distribution for data center security – a feasibility study

Data centers are nowadays referred to as the digital world's cornerstone...

Please sign up or login with your details

Forgot password? Click here to reset