没有合适的资源?快使用搜索试试~ 我知道了~
NIST内部报告 NIST IR 8431
需积分: 3 0 下载量 76 浏览量
2024-04-02
19:08:34
上传
评论
收藏 864KB PDF 举报
温馨提示
抗量子算法第三轮评选结果报告,属于NIST IR
资源推荐
资源详情
资源评论





















NIST IR 8413-upd1
Status Report on the Third Round of the
NIST Post-Quantum Cryptography
Standardization Process
Gorjan Alagic
Daniel Apon
David Cooper
Quynh Dang
Thinh Dang
John Kelsey
Jacob Lichtinger
Yi-Kai Liu
Carl Miller
Dustin Moody
Rene Peralta
Ray Perlner
Angela Robinson
Daniel Smith-Tone
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8413-upd1

NIST IR 8413-upd1
Status Report on the Third Round of the
NIST Post-Quantum Cryptography
Standardization Process
Gorjan Alagic
Daniel Apon*
* Former NIST employee; all work for this publication
was done while at or under contract with NIST.
David Cooper
Quynh Dang
Thinh Dang
John Kelsey
Jacob Lichtinger
Carl Miller
Dustin Moody
Rene Peralta
Ray Perlner
Angela Robinson
Daniel Smith-Tone
Computer Security Division
Information Technology Laboratory
Yi-Kai Liu
Applied and Computational Mathematics Division
Information Technology Laboratory
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8413-upd1
July 2022
Includes updates as of 09-26-2022; see Appendix E
U.S. Department of Commerce
Gina M. Raimondo, Secretary
National Institute of Standards and Technology
Laurie E. Locascio, NIST Director and Under Secretary of Commerce for Standards and Technology

National Institute of Standards and Technology Interagency or Internal Report
NIST IR 8413-upd1
102 pages (July 2022)
This publication is available free of charge from:
https://doi.org/10.6028/NIST.IR.8413-upd1
Certain commercial entities, equipment, or materials may be identified in this document in order to describe
an experimental procedure or concept adequately. Such identification is not intended to imply recommen-
dation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are
necessarily the best available for the purpose.
There may be references in this publication to other publications currently under development by NIST in
accordance with its assigned statutory responsibilities. The information in this publication, including con-
cepts and methodologies, may be used by federal agencies even before the completion of such companion
publications. Thus, until each publication is completed, current requirements, guidelines, and procedures,
where they exist, remain operative. For planning and transition purposes, federal agencies may wish to
closely follow the development of these new publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and provide
feedback to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at
https://csrc.nist.gov/publications.
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology Laboratory
100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930
All comments are subject to release under the Freedom of Information Act (FOIA).

NIST IR 8413-upd1 Third Round Status Report
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and
Technology (NIST) promotes the U.S. economy and public welfare by providing technical
leadership for the Nation’s measurement and standards infrastructure. ITL develops tests,
test methods, reference data, proof of concept implementations, and technical analyses to
advance the development and productive use of information technology. ITL’s responsi-
bilities include the development of management, administrative, technical, and physical
standards and guidelines for the cost-effective security and privacy of other than national
security-related information in federal information systems.
Abstract
The National Institute of Standards and Technology is in the process of selecting public-
key cryptographic algorithms through a public, competition-like process. The new public-
key cryptography standards will specify additional digital signature, public-key encryp-
tion, and key-establishment algorithms to augment Federal Information Processing Stan-
dard (FIPS) 186-4, Digital Signature Standard (DSS), as well as NIST Special Publication
(SP) 800-56A Revision 3, Recommendation for Pair-Wise Key-Establishment Schemes Us-
ing Discrete Logarithm Cryptography, and SP 800-56B Revision 2, Recommendation for
Pair-Wise Key Establishment Using Integer Factorization Cryptography. It is intended that
these algorithms will be capable of protecting sensitive information well into the foresee-
able future, including after the advent of quantum computers.
This report describes the evaluation and selection process of the NIST Post-Quantum
Cryptography Standardization process third-round candidates based on public feedback
and internal review. The report summarizes each of the 15 third-round candidate algorithms
and identifies those selected for standardization, as well as those that will continue to be
evaluated in a fourth round of analysis. The public-key encryption and key-establishment
algorithm that will be standardized is CRYSTALS–KYBER. The digital signatures that will
be standardized are CRYSTALS–Dilithium, FALCON, and SPHINCS
+
. While there are
multiple signature algorithms selected, NIST recommends CRYSTALS–Dilithium as the
primary algorithm to be implemented. In addition, four of the alternate key-establishment
candidate algorithms will advance to a fourth round of evaluation: BIKE, Classic McEliece,
HQC, and SIKE. These candidates are still being considered for future standardization.
NIST will also issue a new Call for Proposals for public-key digital signature algorithms to
augment and diversify its signature portfolio.
Keywords
cryptography; digital signatures; key-encapsulation mechanism (KEM); key-establishment;
post-quantum cryptography; public-key encryption; quantum resistant; quantum safe
i

NIST IR 8413-upd1 Third Round Status Report
Supplemental Content
The NIST Post-Quantum Cryptography Standardization Process webpage is available at
https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-
standardization
Acknowledgments
NIST would like to thank all of the candidate submission teams who developed, de-
signed, and analyzed post-quantum public-key algorithms and prepared detailed submis-
sion packages describing their algorithms.
NIST is also grateful for the efforts of those in the cryptographic community who pro-
vided security, implementation, and performance analyses of the candidate algorithms dur-
ing the first, second, and third rounds. NIST would not be able to select new post-quantum
public-key algorithms for standardization without the combined efforts of these individuals
and the algorithm submitters.
The authors of this report are also appreciative of the efforts by other members of
NIST’s Post-Quantum Cryptography team who reviewed candidate algorithms, analyses,
and public comments; performed testing; provided technical and administrative support;
and participated in numerous meetings to discuss the selection of the second-round candi-
dates. They are Zuzana Bajcsy, Larry Bassham, Lily Chen, Morris Dworkin, Sara Kerman,
and Andrew Regenscheid. Finally, the authors also would like to thank NIST legal counsel
for helpful discussions.
ii
剩余101页未读,继续阅读
资源评论


sulphone
- 粉丝: 0
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 基于 Python 与 Django 框架,集成 face-recognition、keras、tensorflow 及 opencv 等库的后端项目
- 计算机网络安全与防范喻骏.doc
- 软件开发质量管理层次模型(下).docx
- 《基因工程的基本操作程序》.ppt
- 文科院校大学计算机基础教学改革与实践.docx
- 四层楼电梯的PLC控制设计.doc
- 软考嵌入式系统设计师基础知识复习笔记讲解资料.doc
- 油气田物联网设备在线管理系统研究.doc
- 基于 IMDB 数据集利用 LSTM 和预训练词典向量进行电影评论情感分类分析
- 企业云计算平台虚拟化软件选型方案.doc
- 如何将Photoshop模糊过的图片清晰还原.doc
- c语言课程学生成绩管理.doc
- 《C语言程序设计与数据结构》课件第08章.ppt
- 单片机配电房温湿度测控系统设计方案.doc
- 电子商务对物联网技术的运用.docx
- 基于网络环境的小学信息技术微课教学探究-(3).doc
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制
