Journal article Open Access

Software Emulation of Quantum Resistant Trusted Platform Modules

Fiolhais, L.; Martins, P.; Sousa, L.


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/0f4afc28-5f61-4676-8476-a6c693085e6b/39-Software%20Emulation%20of%20Quantum%20Resistant%20Trusted%20Platform%20Modules.pdf"
      }, 
      "checksum": "md5:1a9cefbf90d02e2ad30ad8b275e6fd23", 
      "bucket": "0f4afc28-5f61-4676-8476-a6c693085e6b", 
      "key": "39-Software Emulation of Quantum Resistant Trusted Platform Modules.pdf", 
      "type": "pdf", 
      "size": 247547
    }
  ], 
  "owners": [
    41483
  ], 
  "doi": "10.5281/zenodo.3979200", 
  "stats": {
    "version_unique_downloads": 94.0, 
    "unique_views": 115.0, 
    "views": 124.0, 
    "version_views": 124.0, 
    "unique_downloads": 94.0, 
    "version_unique_views": 115.0, 
    "volume": 25992435.0, 
    "version_downloads": 105.0, 
    "downloads": 105.0, 
    "version_volume": 25992435.0
  }, 
  "links": {
    "doi": "https://doi.org/10.5281/zenodo.3979200", 
    "conceptdoi": "https://doi.org/10.5281/zenodo.3979199", 
    "bucket": "https://zenodo.org/api/files/0f4afc28-5f61-4676-8476-a6c693085e6b", 
    "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.3979199.svg", 
    "html": "https://zenodo.org/record/3979200", 
    "latest_html": "https://zenodo.org/record/3979200", 
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.3979200.svg", 
    "latest": "https://zenodo.org/api/records/3979200"
  }, 
  "conceptdoi": "10.5281/zenodo.3979199", 
  "created": "2020-08-11T11:02:10.889443+00:00", 
  "updated": "2020-08-11T12:59:22.381090+00:00", 
  "conceptrecid": "3979199", 
  "revision": 2, 
  "id": 3979200, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.3979200", 
    "description": "<p>Trusted Platform Modules (TPMs) serve as the root of trust to design and implement secure systems. Conceived by the Trusted Computing Group, a computer industry consortium, components complying with the TPM 2.0 standard are stable and widely available. However, should large-scale quantum computing become a reality, the type of cryptographic primitives adopted in the current standard will no longer be secure. For this reason, this paper analyses the impact of adding three Post-Quantum (PQ) algorithms to a current non- Quantum Resistant TPM through software emulation. The experimental results give insight on the kind of implementation challenges hardware designers will face when integrating the new primitives onto the TPM, that typically features limited hardware resources and low power consumption. In particular, it is concluded that Kyber, NTTRU, and Dilithium can efficiently replace most of the functionality provided by Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA). In contrast, current PQ Direct Anonymous Attestation (DAA) protocols are currently not compact enough to fit into a hardware TPM.</p>", 
    "language": "eng", 
    "title": "Software Emulation of Quantum Resistant Trusted Platform Modules", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3979199"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3979200"
          }
        }
      ]
    }, 
    "communities": [
      {
        "id": "futuretpm-h2020"
      }
    ], 
    "grants": [
      {
        "code": "779391", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::779391"
        }, 
        "title": "Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module", 
        "acronym": "FutureTPM", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "keywords": [
      "Public-key cryptography", 
      "Symmetric-key cryptography", 
      "Post-quantum cryptography", 
      "Direct Anonymous Attestation", 
      "Trust Platform Module"
    ], 
    "publication_date": "2020-08-11", 
    "creators": [
      {
        "affiliation": "Universidade de Lisboa", 
        "name": "Fiolhais, L."
      }, 
      {
        "affiliation": "Universidade de Lisboa", 
        "name": "Martins, P."
      }, 
      {
        "affiliation": "Universidade de Lisboa", 
        "name": "Sousa, L."
      }
    ], 
    "meeting": {
      "acronym": "SECRYPT", 
      "dates": "Jul 8, 2020 \u2013 Jul 10, 2020", 
      "place": "Virtual Conference", 
      "title": "2020 International Conference on Security and Cryptography"
    }, 
    "access_right": "open", 
    "resource_type": {
      "subtype": "article", 
      "type": "publication", 
      "title": "Journal article"
    }, 
    "related_identifiers": [
      {
        "scheme": "doi", 
        "identifier": "10.5281/zenodo.3979199", 
        "relation": "isVersionOf"
      }
    ]
  }
}
124
105
views
downloads
All versions This version
Views 124124
Downloads 105105
Data volume 26.0 MB26.0 MB
Unique views 115115
Unique downloads 9494

Share

Cite as