🚀
v13vv/GitBook
🚀
v13vv/GitBook
  • 🌌About this blog
  • The Author
    • v13vv
  • 2025
    • TryHackMe
    • HackTheBox
    • TheCyberMentor
    • PNPT
    • CPTS
    • AZ-500
  • 2024
    • CTFs
      • idekCTF 2024
        • misc/NM~~PZ~~ - easy
      • 🐭Bandit - OverTheWire
        • Bandit 0
        • Bandit 1 ( level 0->1 )
        • Bandit 2 ( level 1->2 )
        • Bandit 3 ( level 2->3 )
        • Bandit 4 ( level 3->4 )
        • Bandit 5 ( level 4->5 )
      • 🐯Natas - OverTheWire
        • Natas 0
        • Natas 1 ( level 0->1 )
        • Natas 2 ( level 1->2 )
        • Natas 3 ( level 2->3 )
    • Security+ Labs
      • ⛑️CompTIA Security+ - 101Labs.net
        • Lab 41 – Getting a reverse shell on a server through a file upload
        • Lab 42 – Manual privilege escalation using python
    • WEB SECURITY
      • 🍊Web Security Academy - PortSwigger
        • Burp Suite Setup on Kali Linux
        • Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
        • Lab: SQL injection vulnerability allowing login bypass
        • Lab: Reflected XSS into HTML context with nothing encoded
    • NETWORKING
      • 🌊Wireshark Labs - Jim Kurose Homepage
        • Getting Started
    • POST-QUANTUM CRYPTOGRAPHY
      • A Study of Algorithms Development for Post-Quantum Cryptography
        • NIST Post-Quantum Cryptography Standardization
          • Call for Proposals in Security Aspect
          • Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process
          • KEM / Digital Signature
            • Kyber
              • What is Kyber ?
                • Module Learning With Errors (M-LWE)
              • Kyber Cryptanalysis
                • Timing Attack
Powered by GitBook
On this page
  • Security Aspect
  • 1.) Security Definition
  • 2.) Security Strength
  1. 2024
  2. POST-QUANTUM CRYPTOGRAPHY
  3. A Study of Algorithms Development for Post-Quantum Cryptography
  4. NIST Post-Quantum Cryptography Standardization

Call for Proposals in Security Aspect

This Canva presentation was created by me in order to provide understanding in security aspects of the Post-Quantum Cryptography nominations in NIST Post-Quantum Cryptography standardization.

PreviousNIST Post-Quantum Cryptography StandardizationNextStatus Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process

Last updated 9 months ago

Security Aspect

1.) Security Definition

There are some security standard definitions provided in the "Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process" by NIST.

  • IND-CCA2 (Indistinguishability under Adaptive Chosen-Ciphertext Attack)

  • IND-CPA (Indistinguishability under Chosen-Plaintext Attack)

2.) Security Strength

Goal

  • The parameter sets being compared provide comparable security

  • To allow NIST to make prudent future decisions regarding when to transition to longer keys.

  • To help submitters make consistent and sensible choices regarding what symmetric primitives to use in padding mechanisms

  • To better understand the security/performance tradeoffs involved in a given design approach.

Classification

  • Key search on a block cipher with a 128-bit key (e.g. AES128)

  • Collision search on a 256-bit hash function (e.g. SHA256/ SHA3-256)

  • Key search on a block cipher with a 192-bit key (e.g. AES192)

  • Collision search on a 384-bit hash function (e.g. SHA384/ SHA3-384)

  • Key search on a block cipher with a 256-bit key (e.g. AES 256)

Circuit depth is the count of time steps needed to execute all the gates in a quantum circuit

Required attacker computing resources greater than
Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process