Extensible Post Quantum Cryptography Based Authentication
By: Homer A. Riva-Cambrin , Rahul Singh , Sanju Lama and more
Potential Business Impact:
Secures online secrets from future quantum computers.
Cryptography underpins the security of modern digital infrastructure, from cloud services to health data. However, many widely deployed systems will become vulnerable after the advent of scalable quantum computing. Although quantum-safe cryptographic primitives have been developed, such as lattice-based digital signature algorithms (DSAs) and key encapsulation mechanisms (KEMs), their unique structural and performance characteristics make them unsuitable for existing protocols. In this work, we introduce a quantum-safe single-shot protocol for machine-to-machine authentication and authorization that is specifically designed to leverage the strengths of lattice-based DSAs and KEMs. Operating entirely over insecure channels, this protocol enables the forward-secure establishment of tokens in constrained environments. By demonstrating how new quantum-safe cryptographic primitives can be incorporated into secure systems, this study lays the groundwork for scalable, resilient, and future-proof identity infrastructures in a quantum-enabled world.
Similar Papers
Performance Analysis and Deployment Considerations of Post-Quantum Cryptography for Consumer Electronics
Cryptography and Security
Makes phones and gadgets safe from future computer hacks.
A Scalable Framework for Post-Quantum Authentication in Public Key Infrastructures
Cryptography and Security
Protects computers from future quantum attacks.
Post-Quantum Cryptography and Quantum-Safe Security: A Comprehensive Survey
Cryptography and Security
Secures computers from future quantum attacks.