Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was...
37 KB (2,770 words) - 14:52, 14 August 2024
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
62 KB (6,467 words) - 14:01, 8 November 2024
Technology (NIST), specified that algorithms in its post-quantum cryptography competition support a minimum of 264 signatures safely. In 2022, NIST announced...
20 KB (2,329 words) - 09:31, 3 September 2024
Kyber (category Lattice-based cryptography)
Third Round of the NIST Post-Quantum Cryptography Standardization Process (PDF), Gaithersburg, MD, pp. NIST IR 8413, doi:10.6028/nist.ir.8413,...
14 KB (1,416 words) - 19:09, 20 October 2024
solved efficiently. In 2024 NIST announced the Module-Lattice-Based Digital Signature Standard for post-quantum cryptography. In 1996, Miklós Ajtai introduced...
23 KB (2,793 words) - 23:26, 17 September 2024
Victor S. Miller in 1985. Elliptic curve cryptography algorithms entered wide use in 2004 to 2005. In 1999, NIST recommended fifteen elliptic curves. Specifically...
39 KB (4,674 words) - 13:00, 24 September 2024
NewHope (category Post-quantum cryptography)
contestant in the NIST Post-Quantum Cryptography Standardization competition, and was used in Google's CECPQ1 experiment as a quantum-secure algorithm...
4 KB (409 words) - 14:18, 28 August 2023
NTRU (redirect from HRSS (cryptography))
round of NIST's Post-Quantum Cryptography Standardization project, whereas NTRU Prime became an alternate candidate. At equivalent cryptographic strength...
12 KB (1,213 words) - 11:11, 15 August 2024
McEliece cryptosystem (category Post-quantum cryptography)
has never gained much acceptance in the cryptographic community, but is a candidate for "post-quantum cryptography", as it is immune to attacks using Shor's...
16 KB (2,089 words) - 08:29, 14 August 2024
Daniel J. Bernstein (section Cryptography)
was one of four algorithms selected as winners of the NIST Post-Quantum Cryptography Standardization competition. It was the only hash-based algorithm of...
21 KB (1,904 words) - 06:03, 31 August 2024
NTRUSign (category Post-quantum cryptography)
A redesigned pqNTRUSign had been submitted to the NIST Post-Quantum Cryptography Standardization competition. It is based on "hash-and-sign" (contrasting...
6 KB (628 words) - 20:29, 28 December 2022
In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
13 KB (1,533 words) - 23:19, 23 October 2024
Falcon (signature scheme) (category Cryptography stubs)
verifications per second.[11] Post-quantum cryptography Lattice-based cryptography NTRU NIST Post-Quantum Cryptography Standardization 1.^ Thomas Prest; Pierre-Alain...
4 KB (388 words) - 19:19, 21 April 2024
Key size (redirect from Cryptography/key length)
keylength calculator Articles discussing the implications of quantum computing NIST cryptographic toolkit Burt Kaliski: TWIRL and RSA key sizes (May 2003)...
29 KB (3,213 words) - 18:15, 18 September 2024
BLISS signature scheme (redirect from BLISS (cryptography))
potential candidate for standardization, however it was not submitted to NIST. NIST's criteria for selecting schemes to standardize includes side-channel...
4 KB (461 words) - 00:40, 15 October 2024
execution, NIST recommends an iteration count of 10,000 or more.: 5.1.1.2 Avalanche effect Comparison of cryptographic hash functions Cryptographic agility...
48 KB (6,237 words) - 00:38, 5 November 2024
Server. He is a submitter of the Frodo post-quantum proposal to the NIST Post-Quantum Cryptography Standardization project. His leadership has also been...
5 KB (474 words) - 06:45, 29 July 2024
National Institute of Standards and Technology (redirect from Nist)
8, 2023. Retrieved October 19, 2023. "NIST Releases First 3 Finalized Post-Quantum Encryption Standards". NIST. August 13, 2024. "2012 Plum Book". Government...
49 KB (4,797 words) - 02:11, 8 November 2024
Competition to design authenticated encryption schemes Post-Quantum Cryptography Standardization "Federal Register / Vol. 72, No. 212" (PDF). Federal Register...
27 KB (2,244 words) - 20:34, 28 February 2024
the performance implications, the NIST recommends an "extended AES-CTR-DRBG interface" for its Post-Quantum Cryptography Project submissions. This interface...
29 KB (3,627 words) - 07:56, 1 October 2024
Ring learning with errors key exchange (category Post-quantum cryptography)
n = 1024 parameters of Singh, and was submitted to NIST's Post-Quantum Cryptography Standardization project under the name NewHope. Also in their November...
23 KB (3,424 words) - 23:09, 30 August 2024
multivariate cryptography signature schemes (GeMMS, LUOV, Rainbow and MQDSS) have made their way into the 2nd round of the NIST post-quantum competition:...
8 KB (1,145 words) - 10:46, 3 September 2024
increases the time taken to attack the password hashes. Salt (cryptography) HMAC passwd "NIST Special Publication 800-63B". 2022-12-16. Section 5.1.1.2....
8 KB (1,045 words) - 20:49, 6 November 2024
Symmetric-key algorithm (redirect from Symmetric key cryptography)
symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography. Quantum computers would exponentially increase the speed at which...
15 KB (1,544 words) - 20:48, 3 November 2024
Elliptic Curve Digital Signature Algorithm (category Public-key cryptography)
for elliptic-curve cryptography". October 25, 2013. Bernstein, Daniel J.; Lange, Tanja (May 31, 2013). "Security dangers of the NIST curves" (PDF). Schneier...
19 KB (2,833 words) - 03:20, 18 September 2024
Advanced Encryption Standard (category Cryptography)
announced by the NIST as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001. This announcement followed a five-year standardization process in which fifteen...
49 KB (5,566 words) - 22:30, 30 October 2024
SHA-3 (category NIST hash function competition)
successful attacks on MD5, SHA-0 and SHA-1, NIST perceived a need for an alternative, dissimilar cryptographic hash, which became SHA-3. After a setup period...
52 KB (5,712 words) - 05:04, 9 October 2024
exchange, RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), and Post-quantum cryptography. Secure symmetric algorithms include the commonly used...
100 KB (10,952 words) - 00:57, 9 November 2024
the performance implications, the NIST recommends an "extended AES-CTR-DRBG interface" for its Post-Quantum Cryptography Project submissions. This interface...
17 KB (1,979 words) - 19:45, 1 April 2024
Message authentication code (redirect from MAC (cryptography))
In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating...
16 KB (1,914 words) - 13:54, 20 October 2024