TY - GEN
T1 - Applying a cryptographic metric to post-quantum lattice-based signature algorithms
AU - Rautell, Markus
AU - Latvala, Outi Marja
AU - Vallivaara, Visa
AU - Halunen, Kimmo
N1 - Funding Information:
This work has been conducted in the Post Quantum Cryptograpy Finland project, which has received funding from Business Finland.
Publisher Copyright:
© 2022 ACM.
PY - 2022/8/23
Y1 - 2022/8/23
N2 - Measuring the security of cryptographic systems is not a simple task. Nevertheless, there is an increasing need for a cryptographic metric which could assist in decision making when choosing between various candidates. The National Institute of Standards and Technology (NIST) has launched a process to standardize quantum-resistance public key encryption, key encapsulation and digital signature algorithms. This is NIST's response to the threat posed by quantum computers against classical public key cryptography. In this paper, we apply a metric taxonomy, produced by earlier studies, to two NIST third round finalist digital signature algorithms Dilithium and Falcon in order to asses the effectiveness and extensiveness of the metric. Although, our results show that clear differences can be found with used metrics, we propose some improvements to them to allow more comprehensive analysis.
AB - Measuring the security of cryptographic systems is not a simple task. Nevertheless, there is an increasing need for a cryptographic metric which could assist in decision making when choosing between various candidates. The National Institute of Standards and Technology (NIST) has launched a process to standardize quantum-resistance public key encryption, key encapsulation and digital signature algorithms. This is NIST's response to the threat posed by quantum computers against classical public key cryptography. In this paper, we apply a metric taxonomy, produced by earlier studies, to two NIST third round finalist digital signature algorithms Dilithium and Falcon in order to asses the effectiveness and extensiveness of the metric. Although, our results show that clear differences can be found with used metrics, we propose some improvements to them to allow more comprehensive analysis.
KW - Lattice Encryption
KW - Metrics
KW - Post-Quantum Cryptography
KW - Signatures
UR - http://www.scopus.com/inward/record.url?scp=85136921666&partnerID=8YFLogxK
U2 - 10.1145/3538969.3544438
DO - 10.1145/3538969.3544438
M3 - Conference article in proceedings
AN - SCOPUS:85136921666
T3 - ACM International Conference Proceeding Series
SP - 8
BT - Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022
PB - Association for Computing Machinery ACM
T2 - 17th International Conference on Availability, Reliability and Security, ARES 2022
Y2 - 23 August 2022 through 26 August 2022
ER -