Lecture

Postquantum TLS: Key Exchange and Authentication

Description

This lecture covers the implementation of Post-Quantum Transport Layer Security (TLS) without handshake signatures, focusing on key exchange and authentication using Key Encapsulation Mechanism (KEM). It discusses the challenges of post-quantum signatures, the structure of KEMTLS, and the phases involved in the protocol. The lecture also explores the security analysis, definitions, and postulates related to KEMTLS, emphasizing the security properties, negotiation, deniability, and implementation aspects. Additionally, it addresses the performance measurements, caching of intermediate CA certificates, and the impact on handshake sizes and speed. The presentation concludes with acknowledgments and a roadmap for future improvements.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.