Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








10,991 Hits in 5.1 sec

Quantum Secured Internet Transport [article]

Bernardo Huberman, Bob Lund, Jing Wang
2020 arXiv   pre-print
Quantum computing represents an emerging threat to the public key infrastructure underlying transport layer security (TLS) widely used in the Internet.  ...  This paper describes how QKD symmetric keys can be used with TLS to provide quantum computing resistant security for existing Internet applications.  ...  QKD F OR T HE I NTERNET QKD and Internet Transport Security Transport Layer Security (TLS) [10] and the deprecated Secure Sockets Layer (SSL) protocols [11] are the basis for web services transport  ... 
arXiv:2007.05522v1 fatcat:hdappjqq6zd3rlvnf54rovltba

Post Quantum Secure Command and Control of Mobile Agents : Inserting quantum-resistant encryption schemes in the Secure Robot Operating System [article]

Richa Varma, Chris Melville, Claudio Pinello, Tuhin Sahai
2020 arXiv   pre-print
Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with the robot operating system (ROS) and C&C of mobile  ...  We integrate these schemes in the application and network layers, and study the performance of these methods by comparing them to present day security schemes such as the widely used RSA algorithm.  ...  In Section III, we discuss our work on integrating existing post-quantum resistant cryptosystems at the ROS application layer.  ... 
arXiv:2009.07937v1 fatcat:3ymhwtfa4fbqlkdmueu4m4ljwq

Quantum Key Distribution (Qkd) And Commodity Security Protocols: Introduction And Integration

Alan Mink, Sheila Frankel, Ray Perlner
2009 Zenodo  
We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity.  ...  For such a QKD integration we propose a support layer that provides a set of common QKD services between the QKD protocol and the security applications.  ...  Commodity security protocols, such as Internet Protocol Security (IPsec) and Transport Layer Security (TLS, often referred to as Secure Sockets Layer or SSL), currently handle the bulk of today's internet  ... 
doi:10.5281/zenodo.1239668 fatcat:xq3j3tzew5gldgbaza4ya5itui

Guest Editors' Introduction

Francesco Regazzoni, Arquimedes Canedo, Mohammad Abdullah Al Faruque
2019 IEEE Embedded Systems Letters  
The work proposes an implementation of a quantum resistant datagram transport layer security (DTLS) for establishing secure communications suitable for being deployed in CPSs.  ...  The second paper addresses the problem of long-term security and of the transition to quantum resistant cryptographic primitives.  ... 
doi:10.1109/les.2019.2910027 fatcat:zyzpmuxkhzexzpe4wqdoazzdhm

Securing Ethernet-based Optical Fronthaul for 5G Network

Joo Yeon Cho, Andrew Sergeev, Jim Zou
2020 Journal of Cyber Security and Mobility  
Our analysis is further extended with quantum-resistant cryptographic solutions for the long-term security of fronthaul networks.  ...  This redundancy may cause unexpected latency and performance degradation in the data transport for 5G networks.  ...  This means that IPsec can achieve quantum-resistance by enforcing the use of a quantum-resistant cipher suite during the IKE protocol.  ... 
doi:10.13052/jcsm2245-1439.913 fatcat:ixg5kremg5a2fockpkrjeymiei

Post-quantum MACsec in Ethernet Networks

Joo Yeon Cho, Andrew Sergeev
2021 Journal of Cyber Security and Mobility  
To provide a long-term security, the MACsec protocol should be resistant to future attacks including quantum attacks. In this paper, MACsec is analysed under a quantum attack scenario.  ...  On the other hand, classical public-key cryptosystems in MKA are not secure at all against quantum attacks so that they need to be replaced by post-quantum crypto schemes in a quantum world.  ...  Layer 2 is primarily used for transporting a large volume of data in LAN or WAN with high throughput and low latency. While MACsec offers a strong security solution for Layer 2 (e.g.  ... 
doi:10.13052/jcsm2245-1439.1016 fatcat:wntvv7anxjah7eoxudsyoew6ra

FIPS Compliant Quantum Secure Communication using Quantum Permutation Pad [article]

Alex He and Dafu Lou and Eric She and Shangjie Guo and Hareesh Watson and Sibyl Weng and Maria Perepechaenko and Rand Kuang
2023 arXiv   pre-print
Quantum computing has entered fast development track since Shor's algorithm was proposed in 1994. Multi-cloud services of quantum computing farms are currently available.  ...  To overcome this performance reduction, we suggest using quantum encryption with a quantum permutation pad for the data encryption with a minor performance reduction of less than 10 percent.  ...  The existing TLS cryptomodule is in the transport layer, while the nested TLS is in the application layer.  ... 
arXiv:2301.00062v2 fatcat:mvf5twmru5clxhy3ny2d2ctfme

Post-Quantum Era in V2X Security: Convergence of Orchestration and Parallel Computation [article]

Engin Zeydan, Yekta Turk, Berkin Aksoy, Yaman Yagiz Tasbag
2021 arXiv   pre-print
To ensure reliable, continuous and secure operation of these scenarios, quantum resistant security algorithms (QRSAs) that enable secure connectivity must be integrated into the network management and  ...  Along with the potential emergence of quantum computing, safety and security of new and complex communication services such as automated driving need to be redefined in the post-quantum era.  ...  Quantum-capable devices can also be used to attack security protocols established between network devices (such as Transport Layer Security (TLS), Datagram Transport Layer Security (DTLS), Internet Protocol  ... 
arXiv:2112.06814v1 fatcat:jks4vbz6lrgr3lgdy7u63rj67u

Two-dimensional electron gas in monolayer InN quantum wells

W. Pan, E. Dimakis, G. T. Wang, T. D. Moustakas, D. C. Tsui
2014 Applied Physics Letters  
Moreover, the diagonal resistance of the 2DES shows virtually no temperature dependence in a wide temperature range, indicating the topological nature of the 2DES.  ...  The electron density and mobility of the two-dimensional electron system (2DES) in these InN quantum wells are 5x10^15 cm^-2 and 420 cm^2/Vs, respectively.  ...  results from our electron transport studies confirming that indeed the electron system in InN quantum wells is of two-dimensional nature.  ... 
doi:10.1063/1.4902916 fatcat:mca5tgkldvbuthfdpwavy5xmdm

Hysteresis in the quantum Hall regimes in electron double quantum well structures

W. Pan, J. L. Reno, J. A. Simmons
2005 Physical Review B  
We present in this paper experimental results on the transport hysteresis in electron double quantum well structures.  ...  Furthermore, we observe that hysteresis is generally stronger in the even integer quantum Hall effect (IQHE) regime than in the odd-IQHE regime.  ...  Sandia National Laboratories is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin company, for the United States Department of Energy's National Nuclear Security Administration  ... 
doi:10.1103/physrevb.71.153307 fatcat:cuff3smhtbe65h5envjub5zg3i

Observation of quantum transport features in graphene devices fabricated utilizing a nano-manipulating probe technique [article]

Christopher Coleman, Davie Mtsuko, Chris Botha, Somnath Bhattacharyyaa
2015 arXiv   pre-print
The quantum lifetime in this multilayered graphene is in the range 22 to 90 fs corresponding to a disorder-broadening of 5 to 15 meV.  ...  Furthermore it has been experimentally demonstrated that transport between few layer graphene is strongly related to the stacking order of the layers and breakdown of coherent transport can occur due to  ...  Apart from the carrier density shown in Fig. 3(c) , we can extract two extra transport parameters from the SdH oscillation data analysis namely the carrier lifetime or the quantum scattering time and  ... 
arXiv:1504.02328v1 fatcat:ybhdz6mxjvazrfoo2j6fermdbu

Table of contents

2021 2021 International Symposium on VLSI Technology, Systems and Applications (VLSI-TSA)  
Nanotube FETs from Quantum Simulations: Comparison with Experiments Session T9: Special Session-Hardware Security (All Invited)  ...  Amorphous InGaZnO Thin Film Transistors with High Mobility and T9-1 Quantum Tunneling PUF: a Chip Fingerprint for Hardware Security T9-2 Proof of Authenticity of Logistics Information with Passive RFID  ... 
doi:10.1109/vlsi-tsa51926.2021.9440074 fatcat:ord64jsp2vgnpe2mwzg744zm4u

2020 Index IEEE Transactions on Nanotechnology Vol. 19

2020 IEEE transactions on nanotechnology  
Highly-Efficient Solution Processed Yellow Organic Light Emitting Diode With Tungsten Trioxide Hole Injection/Transport Layer.  ...  Ye, K., +, TNANO 2020 192-196 Cathodes Enhanced Performance Organic Light Emitting Diode With CuI:CuPC Com- posite Hole Transport Layer.  ... 
doi:10.1109/tnano.2021.3055152 fatcat:5ilss2fujfhl7m7o5rvnjgewhm

Nonlinear behavior of memristive devices for hardware security primitives and neuromorphic computing systems [article]

Sahitya Yarragolla, Torben Hemke, Fares Jalled, Tobias Gergs, Jan Trieschmann, Tolga Arul, Thomas Mussenbrock
2024 arXiv   pre-print
Nonlinearity is a crucial characteristic for implementing hardware security primitives or neuromorphic computing systems.  ...  To comprehend the nonlinear behavior, we have to understand the coexistence of resistive, capacitive, and inertia (virtual inductive) effects in these devices.  ...  For very thin layers like a tunnel barrier with a thickness of less than 2 nm, quantum effects become essential.  ... 
arXiv:2402.04848v2 fatcat:pox3a3dv7negvm5zrfkqasxe74

Cryptography Standards in Quantum Time: New Wine in an Old Wineskin?

Lidong Chen
2017 IEEE Security and Privacy  
compels us to look for quantum-resistant counterparts.  ...  Government announced a call for proposals for quantum-resistant public-key cryptographic algorithms on December 15, 2016.  ...  In Transport Layer Security (TLS) as specified in IETF, version 1.2 and earlier versions, three key establishment schemes have been supported, RSA key transport, Static and Ephemeral Diffie-Hellman, and  ... 
doi:10.1109/msp.2017.3151339 pmid:29333107 pmcid:PMC5766008 fatcat:z3gurwsxvvef3m6zrcq3tswacu
« Previous Showing results 1 — 15 out of 10,991 results