Please use this identifier to cite or link to this item:
|Title:||An Efficient Cryptographic Technique Using Post-Quantum Cryptography|
|Abstract:||Post-quantum cryptography (PQC) refers to the cryptographic techniques that are secure againstcryptanalyticattacksbyquantumcomputers. InPQC,lattice-basedcryptography(LBC) is the popular approach for designing public-key cryptographic techniques such as key exchange protocols, digital signature, and encryption techniques. The key exchange protocol is one of the basic cryptographic primitives of the Public Key Infrastructure (PKI). However, the literature about the study of key exchange protocols using lattice-based cryptography is limited, and often the schemes are studied independently. Therefore, a review of lattice-based key exchange protocols has been done in this work. Further, these protocols have been classiﬁed undertwodifferentcategoriesdependingonthereconciliationmechanismusedbytheprotocol. From the comprehensive literature survey, it has been found that the key exchange protocols designed using LWE/RLWE problems of lattices are not secure if their public-private keys are reused. Due to key reuse, these key exchange protocols are vulnerable to signal leakage attack (SLA)andkeymismatchattack. Amongthesesignalleakageattacksisthemostsevere,andall the RLWE-based key exchange protocols are vulnerable to SLA attack. Therefore, an efﬁcient cryptographic key exchange technique that can resist signal leakage attack has been proposed. This key exchange technique has been proposed for different scenarios. These scenarios are described below as. Firstly, a new Lattice-based Anonymous Password Authenticated Key Exchange (LBAPAKE) protocol for mobile devices has been proposed. The proposed protocol resists the signal leakage attack and provides key reusability, anonymity, and perfect forward secrecy. Also, the formal security analysis of the proposed LBA-PAKE protocol has been done using the widely adopted Real-Or-Random (ROR) model. Further, the proposed LBA-PAKE protocol and Feng et al.’s protocol have been implemented on the common mobile-server platform for the comparative performance analysis. The experimental results show that the proposed LBAPAKE protocol is as efﬁcient as Feng et al.’s protocol with an extra shield of security. Next, the modiﬁed two-party authenticated key agreement (m-2PAKA) protocol for post-quantum world has been proposed|
|Appears in Collections:||Doctoral Theses@CSED|
Files in This Item:
|Vivek_Dabra_Thesis.pdf||5.51 MB||Adobe PDF||View/Open Request a copy|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.