Session

Quantum-Proofing Data: The Power Of Post-Quantum Cryptography

Speakers

Milena Olech
Krystian Matusiewicz
Natalia Wochtman

Label

Moonshot

Session Type

Talk

Contents

Description

Quantum computers leverage principles from quantum mechanics to formulate and execute quantum algorithms. Currently, there are no quantum computers capable of compromising existing cryptographic techniques.

Nevertheless, quantum algorithms can efficiently solve intricate problems within a relatively brief time frame. Notably, Shor’s algorithm has the potential to break the RSA and Elliptic Curve Diffie-Hellman algorithms, which are pivotal for key exchange in Transport Layer Security (TLS).

Furthermore, quantum algorithms pose a threat to the cryptography utilized in the TLS protocol in two critical areas: key exchange and client/server authentication. As a result, the security of the TLS handshake process can be compromised, necessitating the adoption of post-quantum cryptography (PQC) algorithms.

The National Institute of Standards and Technology selected CRYSTALS-Kyber algorithm as the Key Encapsulation Mechanism (KEM) resistant to cryptanalytic attacks with powerful quantum computers.

This paper outlines the mathematical foundation of the CRYSTALS-Kyber algorithm and illustrates its application in the TLS handshake. In order to assess the efficacy of post-quantum cryptography (PQC), a comprehensive comparison between traditional cryptographic methods and post-quantum alternatives has been conducted. The study analyzes the outcomes and provides a condensed summary of the findings.