A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Quantum Secured Internet Transport
[article]
2020
arXiv
pre-print
Quantum computing represents an emerging threat to the public key infrastructure underlying transport layer security (TLS) widely used in the Internet. ...
This paper describes how QKD symmetric keys can be used with TLS to provide quantum computing resistant security for existing Internet applications. ...
QKD F OR T HE I NTERNET
QKD and Internet Transport Security Transport Layer Security (TLS) [10] and the deprecated Secure Sockets Layer (SSL) protocols [11] are the basis for web services transport ...
arXiv:2007.05522v1
fatcat:hdappjqq6zd3rlvnf54rovltba
Post Quantum Secure Command and Control of Mobile Agents : Inserting quantum-resistant encryption schemes in the Secure Robot Operating System
[article]
2020
arXiv
pre-print
Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with the robot operating system (ROS) and C&C of mobile ...
We integrate these schemes in the application and network layers, and study the performance of these methods by comparing them to present day security schemes such as the widely used RSA algorithm. ...
In Section III, we discuss our work on integrating existing post-quantum resistant cryptosystems at the ROS application layer. ...
arXiv:2009.07937v1
fatcat:3ymhwtfa4fbqlkdmueu4m4ljwq
Quantum Key Distribution (Qkd) And Commodity Security Protocols: Introduction And Integration
2009
Zenodo
We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. ...
For such a QKD integration we propose a support layer that provides a set of common QKD services between the QKD protocol and the security applications. ...
Commodity security protocols, such as Internet Protocol Security (IPsec) and Transport Layer Security (TLS, often referred to as Secure Sockets Layer or SSL), currently handle the bulk of today's internet ...
doi:10.5281/zenodo.1239668
fatcat:xq3j3tzew5gldgbaza4ya5itui
Guest Editors' Introduction
2019
IEEE Embedded Systems Letters
The work proposes an implementation of a quantum resistant datagram transport layer security (DTLS) for establishing secure communications suitable for being deployed in CPSs. ...
The second paper addresses the problem of long-term security and of the transition to quantum resistant cryptographic primitives. ...
doi:10.1109/les.2019.2910027
fatcat:zyzpmuxkhzexzpe4wqdoazzdhm
Securing Ethernet-based Optical Fronthaul for 5G Network
2020
Journal of Cyber Security and Mobility
Our analysis is further extended with quantum-resistant cryptographic solutions for the long-term security of fronthaul networks. ...
This redundancy may cause unexpected latency and performance degradation in the data transport for 5G networks. ...
This means that IPsec can achieve quantum-resistance by enforcing the use of a quantum-resistant cipher suite during the IKE protocol. ...
doi:10.13052/jcsm2245-1439.913
fatcat:ixg5kremg5a2fockpkrjeymiei
Post-quantum MACsec in Ethernet Networks
2021
Journal of Cyber Security and Mobility
To provide a long-term security, the MACsec protocol should be resistant to future attacks including quantum attacks. In this paper, MACsec is analysed under a quantum attack scenario. ...
On the other hand, classical public-key cryptosystems in MKA are not secure at all against quantum attacks so that they need to be replaced by post-quantum crypto schemes in a quantum world. ...
Layer 2 is primarily used for transporting a large volume of data in LAN or WAN with high throughput and low latency. While MACsec offers a strong security solution for Layer 2 (e.g. ...
doi:10.13052/jcsm2245-1439.1016
fatcat:wntvv7anxjah7eoxudsyoew6ra
FIPS Compliant Quantum Secure Communication using Quantum Permutation Pad
[article]
2023
arXiv
pre-print
Quantum computing has entered fast development track since Shor's algorithm was proposed in 1994. Multi-cloud services of quantum computing farms are currently available. ...
To overcome this performance reduction, we suggest using quantum encryption with a quantum permutation pad for the data encryption with a minor performance reduction of less than 10 percent. ...
The existing TLS cryptomodule is in the transport layer, while the nested TLS is in the application layer. ...
arXiv:2301.00062v2
fatcat:mvf5twmru5clxhy3ny2d2ctfme
Post-Quantum Era in V2X Security: Convergence of Orchestration and Parallel Computation
[article]
2021
arXiv
pre-print
To ensure reliable, continuous and secure operation of these scenarios, quantum resistant security algorithms (QRSAs) that enable secure connectivity must be integrated into the network management and ...
Along with the potential emergence of quantum computing, safety and security of new and complex communication services such as automated driving need to be redefined in the post-quantum era. ...
Quantum-capable devices can also be used to attack security protocols established between network devices (such as Transport Layer Security (TLS), Datagram Transport Layer Security (DTLS), Internet Protocol ...
arXiv:2112.06814v1
fatcat:jks4vbz6lrgr3lgdy7u63rj67u
Two-dimensional electron gas in monolayer InN quantum wells
2014
Applied Physics Letters
Moreover, the diagonal resistance of the 2DES shows virtually no temperature dependence in a wide temperature range, indicating the topological nature of the 2DES. ...
The electron density and mobility of the two-dimensional electron system (2DES) in these InN quantum wells are 5x10^15 cm^-2 and 420 cm^2/Vs, respectively. ...
results from our electron transport studies confirming that indeed the electron system in InN quantum wells is of two-dimensional nature. ...
doi:10.1063/1.4902916
fatcat:mca5tgkldvbuthfdpwavy5xmdm
Hysteresis in the quantum Hall regimes in electron double quantum well structures
2005
Physical Review B
We present in this paper experimental results on the transport hysteresis in electron double quantum well structures. ...
Furthermore, we observe that hysteresis is generally stronger in the even integer quantum Hall effect (IQHE) regime than in the odd-IQHE regime. ...
Sandia National Laboratories is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin company, for the United States Department of Energy's National Nuclear Security Administration ...
doi:10.1103/physrevb.71.153307
fatcat:cuff3smhtbe65h5envjub5zg3i
Observation of quantum transport features in graphene devices fabricated utilizing a nano-manipulating probe technique
[article]
2015
arXiv
pre-print
The quantum lifetime in this multilayered graphene is in the range 22 to 90 fs corresponding to a disorder-broadening of 5 to 15 meV. ...
Furthermore it has been experimentally demonstrated that transport between few layer graphene is strongly related to the stacking order of the layers and breakdown of coherent transport can occur due to ...
Apart from the carrier density shown in Fig. 3(c) , we can extract two extra transport parameters from the SdH oscillation data analysis namely the carrier lifetime or the quantum scattering time and ...
arXiv:1504.02328v1
fatcat:ybhdz6mxjvazrfoo2j6fermdbu
Table of contents
2021
2021 International Symposium on VLSI Technology, Systems and Applications (VLSI-TSA)
Nanotube FETs from Quantum Simulations: Comparison with
Experiments
Session T9: Special Session-Hardware Security (All Invited) ...
Amorphous InGaZnO Thin Film Transistors with High Mobility and T9-1 Quantum Tunneling PUF: a Chip Fingerprint for Hardware Security T9-2 Proof of Authenticity of Logistics Information with Passive RFID ...
doi:10.1109/vlsi-tsa51926.2021.9440074
fatcat:ord64jsp2vgnpe2mwzg744zm4u
2020 Index IEEE Transactions on Nanotechnology Vol. 19
2020
IEEE transactions on nanotechnology
Highly-Efficient Solution Processed Yellow Organic Light Emitting Diode With Tungsten Trioxide Hole Injection/Transport Layer. ...
Ye, K.,
+, TNANO 2020 192-196
Cathodes
Enhanced Performance Organic Light Emitting Diode With CuI:CuPC Com-
posite Hole Transport Layer. ...
doi:10.1109/tnano.2021.3055152
fatcat:5ilss2fujfhl7m7o5rvnjgewhm
Nonlinear behavior of memristive devices for hardware security primitives and neuromorphic computing systems
[article]
2024
arXiv
pre-print
Nonlinearity is a crucial characteristic for implementing hardware security primitives or neuromorphic computing systems. ...
To comprehend the nonlinear behavior, we have to understand the coexistence of resistive, capacitive, and inertia (virtual inductive) effects in these devices. ...
For very thin layers like a tunnel barrier with a thickness of less than 2 nm, quantum effects become essential. ...
arXiv:2402.04848v2
fatcat:pox3a3dv7negvm5zrfkqasxe74
Cryptography Standards in Quantum Time: New Wine in an Old Wineskin?
2017
IEEE Security and Privacy
compels us to look for quantum-resistant counterparts. ...
Government announced a call for proposals for quantum-resistant public-key cryptographic algorithms on December 15, 2016. ...
In Transport Layer Security (TLS) as specified in IETF, version 1.2 and earlier versions, three key establishment schemes have been supported, RSA key transport, Static and Ephemeral Diffie-Hellman, and ...
doi:10.1109/msp.2017.3151339
pmid:29333107
pmcid:PMC5766008
fatcat:z3gurwsxvvef3m6zrcq3tswacu
« Previous
Showing results 1 — 15 out of 10,991 results