Problem Statement
As quantum computers advance, traditional communication protocols become susceptible to interception. This project aims to develop post-quantum secure communication protocols that can withstand attacks from powerful quantum algorithms, ensuring the confidentiality and integrity of transmitted data.
Abstract
The project addresses the potential threat to communication security posed by quantum computers. By leveraging post-quantum cryptographic techniques, the system will implement communication protocols resistant to quantum attacks. The goal is to provide a secure and future-proof solution for transmitting sensitive information.
Outcome
● Implementation of post-quantum secure communication protocols.
● Resilience against quantum attacks on communication channels.
● Continued confidentiality and integrity of transmitted data in the quantum era.
Reference
Due to development in quantum computing, we need to create and implement new cryptographic protocols, which are resistant to attacks using a quantum computer, in all practical cases. Last years humans became using messengers to transfer far more important information than earlier, so it is necessary to create new post-quantum secure messaging protocols for peer-to-peer and group communications. In this article, we describe needed security properties, existing ways for the creation of group chats, and our suggestions. We described ways and needed primitives for the creation of a group key establishment scheme based on isogenies of elliptic curves. We describe such protocol as an extended Double Ratchet protocol.
1.M. Marlinspike and T. Perrin, “Double Ratchet Algorithm”, Signal, vol. 35, 2016, [online] Available: https://signal.org/docs/specifications/doubleratchet/doubleratchet.pdf.
2.N. Unger et al., “SoK: Secure Messaging”, 2015 IEEE Symposium on Security and Privacy, pp. 232-249, 2015.
3.P. Rösler, C. Mainka and J. Schwenk, “More is Less: On the End-to-End Security of Group Chats in Signal WhatsApp and Threema”, 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 415-429, 2018.
4.K. Cohn-Gordon, C. Cremers, L. Garratt, J. Millican and K. Milner, “On ends-to-ends encryption asynchronous group messaging with strong security guarantees”, Proc. ACM Conf. Comput. Commun. Secur, pp. 1802-1819, 2018.
5.M. Marlinspike and T. Perrin, “The X3DH Key Agreement Protocol”, Signal, pp. 11, 2016, [online] Available: https://www.whispersystems.org/docs/specifications/x3dh/.
https://ieeexplore.ieee.org/document/9396513/references#references