Post Quantum Migration of Tor
- URL: http://arxiv.org/abs/2503.10238v1
- Date: Thu, 13 Mar 2025 10:28:03 GMT
- Title: Post Quantum Migration of Tor
- Authors: Denis Berger, Mouad Lemoudden, William J Buchanan,
- Abstract summary: This dissertation proposes an overview of the cryptographic schemes used by Tor.<n>It highlights the non-quantum-resistant ones and introduces theoretical performance assessment methods of a local Tor network.
- Score: 0.40964539027092917
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Shor's and Grover's algorithms' efficiency and the advancement of quantum computers imply that the cryptography used until now to protect one's privacy is potentially vulnerable to retrospective decryption, also known as \emph{harvest now, decrypt later} attack in the near future. This dissertation proposes an overview of the cryptographic schemes used by Tor, highlighting the non-quantum-resistant ones and introducing theoretical performance assessment methods of a local Tor network. The measurement is divided into three phases. We will start with benchmarking a local Tor network simulation on constrained devices to isolate the time taken by classical cryptography processes. Secondly, the analysis incorporates existing benchmarks of quantum-secure algorithms and compares these performances on the devices. Lastly, the estimation of overhead is calculated by replacing the measured times of traditional cryptography with the times recorded for Post Quantum Cryptography (PQC) execution within the specified Tor environment. By focusing on the replaceable cryptographic components, using theoretical estimations, and leveraging existing benchmarks, valuable insights into the potential impact of PQC can be obtained without needing to implement it fully.
Related papers
- The Hardness of Learning Quantum Circuits and its Cryptographic Applications [1.2116854758481395]
We show that concrete hardness assumptions about learning or cloning the output state of a random quantum circuit can be used as the foundation for secure quantum cryptography.
We construct secure one-way state generators (OWSGs), digital signature schemes, quantum bit commitments, and private key encryption schemes.
arXiv Detail & Related papers (2025-04-21T18:00:03Z) - Quantum-Safe integration of TLS in SDN networks [0.0]
transition to quantum-safe cryptography within the next decade is critical.<n>We have selected Transport Layer Security as the foundation to hybridize classical, quantum, and post-quantum cryptography.<n>The performance of this approach has been demonstrated using a deployed production infrastructure.
arXiv Detail & Related papers (2025-02-24T14:35:56Z) - Cryptanalysis via Machine Learning Based Information Theoretic Metrics [58.96805474751668]
We propose two novel applications of machine learning (ML) algorithms to perform cryptanalysis on any cryptosystem.<n>These algorithms can be readily applied in an audit setting to evaluate the robustness of a cryptosystem.<n>We show that our classification model correctly identifies the encryption schemes that are not IND-CPA secure, such as DES, RSA, and AES ECB, with high accuracy.
arXiv Detail & Related papers (2025-01-25T04:53:36Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - The Impact of Quantum-Safe Cryptography (QSC) on Website Response [0.0]
In 2024, the National Institute of Standards and Technology published Quantum-Safe Cryptography (QSC) standards.
This study aims to evaluate the impact of NIST's Quantum-Resistant Cryptographic Algorithms on website response times.
It was found that the QSC algorithms outperformed the classical algorithm under normal and congested network conditions.
arXiv Detail & Related papers (2024-10-30T03:44:46Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Quantum Patch-Based Autoencoder for Anomaly Segmentation [44.99833362998488]
We introduce a patch-based quantum autoencoder (QPB-AE) for image anomaly segmentation.
QPB-AE reconstructs the quantum state of the embedded input patches, computing an anomaly map directly from measurement.
We evaluate its performance across multiple datasets and parameter configurations.
arXiv Detail & Related papers (2024-04-26T08:42:58Z) - Assessment of cryptographic approaches for a quantum-resistant Galileo OSNMA [4.281182764767519]
We analyse the state of the Galileo Open Service Navigation Message Authentication (OSNMA) to overcome these new threats.
The main barrier to adopting the PQC approach is the size of both the signature and the key.
This work concludes by assessing different temporal countermeasures that can be implemented to sustain the system's integrity in the short term.
arXiv Detail & Related papers (2023-12-18T10:20:50Z) - CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation [42.481750913003204]
Mutual Information (MI) is a measure to evaluate the efficiency of cryptosystems.
Recent advances in machine learning have enabled progress in estimating MI using neural networks.
This work presents a novel application of MI estimation in the field of cryptography.
arXiv Detail & Related papers (2023-09-14T20:30:04Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Anti-Forging Quantum Data: Cryptographic Verification of Quantum
Computational Power [1.9737117321211988]
Quantum cloud computing is emerging as a popular model for users to experience the power of quantum computing through the internet.
How can users be sure that the output strings sent by the server are really from a quantum hardware?
arXiv Detail & Related papers (2020-05-04T14:28:14Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.