Journal article Open Access

Software Emulation of Quantum Resistant Trusted Platform Modules

Fiolhais, L.; Martins, P.; Sousa, L.


JSON-LD (schema.org) Export

{
  "inLanguage": {
    "alternateName": "eng", 
    "@type": "Language", 
    "name": "English"
  }, 
  "description": "<p>Trusted Platform Modules (TPMs) serve as the root of trust to design and implement secure systems. Conceived by the Trusted Computing Group, a computer industry consortium, components complying with the TPM 2.0 standard are stable and widely available. However, should large-scale quantum computing become a reality, the type of cryptographic primitives adopted in the current standard will no longer be secure. For this reason, this paper analyses the impact of adding three Post-Quantum (PQ) algorithms to a current non- Quantum Resistant TPM through software emulation. The experimental results give insight on the kind of implementation challenges hardware designers will face when integrating the new primitives onto the TPM, that typically features limited hardware resources and low power consumption. In particular, it is concluded that Kyber, NTTRU, and Dilithium can efficiently replace most of the functionality provided by Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA). In contrast, current PQ Direct Anonymous Attestation (DAA) protocols are currently not compact enough to fit into a hardware TPM.</p>", 
  "license": "https://creativecommons.org/licenses/by/4.0/legalcode", 
  "creator": [
    {
      "affiliation": "Universidade de Lisboa", 
      "@type": "Person", 
      "name": "Fiolhais, L."
    }, 
    {
      "affiliation": "Universidade de Lisboa", 
      "@type": "Person", 
      "name": "Martins, P."
    }, 
    {
      "affiliation": "Universidade de Lisboa", 
      "@type": "Person", 
      "name": "Sousa, L."
    }
  ], 
  "headline": "Software Emulation of Quantum Resistant Trusted Platform Modules", 
  "image": "https://zenodo.org/static/img/logos/zenodo-gradient-round.svg", 
  "datePublished": "2020-08-11", 
  "url": "https://zenodo.org/record/3979200", 
  "@type": "ScholarlyArticle", 
  "keywords": [
    "Public-key cryptography", 
    "Symmetric-key cryptography", 
    "Post-quantum cryptography", 
    "Direct Anonymous Attestation", 
    "Trust Platform Module"
  ], 
  "@context": "https://schema.org/", 
  "identifier": "https://doi.org/10.5281/zenodo.3979200", 
  "@id": "https://doi.org/10.5281/zenodo.3979200", 
  "workFeatured": {
    "alternateName": "SECRYPT", 
    "location": "Virtual Conference", 
    "@type": "Event", 
    "name": "2020 International Conference on Security and Cryptography"
  }, 
  "name": "Software Emulation of Quantum Resistant Trusted Platform Modules"
}
119
96
views
downloads
All versions This version
Views 119119
Downloads 9696
Data volume 23.8 MB23.8 MB
Unique views 111111
Unique downloads 8787

Share

Cite as