Browse > Article

양자컴퓨팅 시대를 대비하기 위한 암호화 선제대응력(Crypto-Agility) 도입 방안  

Jong Wook, Park (한국전자통신연구원 부설연구소)
Seon Yeob, Baek (한국전자통신연구원 부설연구소)
Jang, Sang-Woon (한국전자통신연구원 부설연구소)
Sang Yun, Han (한국전자통신연구원 부설연구소)
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Google Blog, "Announcing the first SHA1 collision," https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html, February 2017. 
2 Mathy Vanhoef and Frank Piessens, Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2," In Proceedings of the 2017 ACM Computer and Communication Security(CCS), pp1313-1328, Dallas, Tx, USA, November 2017 
3 Ben Seri and Gregory Vishnepolsky "Blueborne - A New Class of Airborne Attacks That Can Remotely Compromise Any Linux/IoT Device," Black Hat Europe 2017, London,UK, December 2017 
4 Neel Mehta, "The Heartbleed Bug," CVE-2014-0160, April 2014 
5 Bodo Moller, Thai Duong and Krzysztof Kotowicz, "This POODLE Bites: Exploiting The SSL 3.0 Fallback," CVE-2014-3566, September 2014 
6 Peter W Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM Journal on Computing 26.5, pp.1484-1509, 1997    DOI
7 Lov K. Grover, "A fast quantum mechanical algorithm for database search," In Proceedings of the 28th Annual ACM Symposium on the Theory of Computing(STC), pp.212-219, New York, NY, USA, July 1996 
8 양자내성암호연구단, https://kpqc.or.kr 
9 NIST Post-Quantum Cryptography Project, https://csrc.nist.gov/projects/post-quantum-cryptography 
10 Willian Barker, William Polk and Murugiah Souppaya, "Getting Ready for Post-quantum Cryptography: Exploring Challenges Associated with Adoption and Using Post-Quantum Cryptographic Algorithms", NIST CSWP 15, April 2021 
11 Panos Kampanakis, Peter Panburana, Ellie Daw and Daniel Van Geest, "The Viability of Post-Quantum X.509 Certificates," IACR Cryptology ePrint, January 2018 
12 NIST NCCOE, "Migration to Post-quantum Cryptography", https://www.nccoe.nist.gov/sites/default/files/2022-07/pqc-migration-project-description-final.pdf  
13 NCSC UK, "Protocol Design Principles", https://ncsc.gov.uk/whitepaper/protocol-design-principles, NCSC UK Whitepaper, December 2020 
14 ANSSI, "ANSSI views on the Post-Quantum Cryptography transition", https://ssi.gouv.fr/en/publications/anssi-technical_position_paper-post_quantum_cryptography_transition, ANSSI Technical Position Papers, January 2001 
15 Hassane Aissaoui Mehrez and Othmane El Omri, "The Crypto Agility Properties", In Proceedings of The 12th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI), pp.99-103, Orlando, FL, USA, July 2018 
16 Olaf Grote, Andreas Ahrens and Cesar Benavente-Peces, "A Review of Post- Quantum Cryptography and Crypto-agility Strategies", In Proceedings of 2019 International Interdisciplinary PhD Workshop (IIPhDW), pp115-120, Wismar, Germany, May
17 Chujiao Ma, Luis Colon, Joe Dera, Bahman Rashidi, and Vaibhav Garg "CARAF: Crypto Agility Risk Assessment Framework", Journal of Cybersecurity, vol. 7, no 1. pp. 1-11, May 2021 
18 Cryptosense, "Cryptosense Analyzer Platform". https://cryptosense.com/analyzer 
19 Infosec Global, "Control Your Cryptography With Crypto Agility Management", https://infosecglobal.com 
20 Senetas, "Bringing Agility to Cryptography", https://www.senetas.com/cybersecurity-challenges/why-encrypt/crypto-agility 
21 Cryptomathic, "CSG Overview", https://www.cryptomatic.com/products/key-management/crypto-service-gateway  
22 Tyson Macaulay and Richard Henderson, "Cryptographic Agility in Practice-emerging use-case," https://assets.website-files.com/612fec6a451c71c9308f4b69/614b712e53ce8f7fad0c3c4a_ISG_AgilityUseCases_Whitepaper-FINAL.pdf, Infosec Global Whitepaper, 2019