There have been numerous impressive algorithms submitted for round 1 of post quantum cryptography hosted by NIST. Out of 50, algorithms like Big Quake, CFPKM, Dink Key Exchange, HILA5, NTRU Prime, Post-quantum RSA-Encryption, Post-quantum RSA-Signature and qTESLA were chosen at first. Finally, Post-quantum RSA-Encryption and Post-quantum RSA-Signature were chosen for the analysis. The reason was that the RSA still remains standardized inspite of the key sizes that have been shown vulnerable to the attacks. Also, post quantum RSA(pqRSA) uses extremely large keys to stop Shorâ€™s algorithm with the help of relatively short secret primes and small encryption/verification exponents.
The pqRSA submission provides signatures, key encapsulation and public key encryption as well. Each operation consists of two parameters, namely K which is a power of 2 and B which is a positive multiple of 8.
Below is the list of parameter sets for Encryption, KEM and Signature.Operation | K | B |
---|---|---|
Encryption | 512 | 512 |
16384 | 512 | |
262144 | 1024 | |
8388608 | 1024 | |
KEM | 512 | 512 |
16384 | 512 | |
262144 | 1024 | |
8388608 | 1024 | |
Signatures | 512 | 512 |
16384 | 512 | |
262144 | 1024 | |
8388608 | 1024 |
[1]Bernstein et al. Post-quantum RSA.online. Available at:csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions