Approaches & Strategies
- A Review of Post-quantum Cryptography and Crypto-agility Strategies: The paper focuses on the established asymmetric and symmetric cryptographic methods and how current security protocols can be adapted against quantum attacks [GAB19]
- API Usability of Stateful Signature Schemes: Easy-to-use API design for stateful signature schemes [ZWH19]
- Agile and versatile quantum communication: Signatures and secrets: In this paper, the authors suggest how these related principles can be applied to the field of quantum cryptography by explicitly demonstrating two quantum cryptographic protocols, quantum digital signatures (QDS) and quantum secret sharing (QSS), on the same hardware sender and receiver platform. [RTK21]
- Agile quantum cryptography and non-classical state generation: Agile quantum cryptography and non-classical state generation: This paper covers a framework of quantum cryptographic agility which allows for a resource-efficient swap of an underlying cryptographic protocol. [T20]
- Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI): RFC6916 formalizes the Migration Process for algorithm suites in the Resource Public Key Infrastructure [GKT13]
- Algorithm Agility – Discussion on TPM 2.0 ECC Functionalities: In this paper, we review all the TPM 2.0 ECC functionalities, and discuss on whether the existing TPM commands can be used to implement new cryptographic algorithms which have not yet been addressed in the specification. [CU16]
- Algorithm-agile cryptographic coprocessor based on FPGAs: This contribution describes the design and implementation of an algorithm-agile cryptographic co-processor board. [PCC99]
- Algorithm-agile encryption in ATM networks: The authors designed a research prototype for an ATM encryptor that implements ATM encryption at 155 Mbps, using the Data Encryption Standard (DES) and a low-latency algorithm. [THP98]
- Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization: This paper provides exploratory research by determining the impact of quantum computing threat on modern routing and switching infrastructure components of IT network infrastructure in a large-size financial organization. [PMS19]
- Blog - Achieving ‘Crypto Agility’: This blog covers the steps to take to prepare for the advent of quantum computers. [S19]
- CARAF: Crypto Agility Risk Assessment Framework: The paper covers a framework that can be used by organizations to determine an appropriate mitigation strategy commensurate with their risk tolerance in regard to quantum computers. [MCD21]
- Comparing the Usability of Cryptographic APIs: This paper is the first to examine both how and why the design and resulting usability of different cryptographic libraries affects the security of code written with them [ABF17]
- Crypto Agility Is a Must-Have for Data Encryption Standards: This blog post covers the importance of cryptographic agility with the advent of quantum computers. [MS18]
- Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS): This document describes the features, properties, and limitations of RADIUS crypto-agility solutions; defines the term “crypto-agility” as used in this context; and provides the motivations for this work. [N11]
- Cryptographic Agility and Interoperability: Proceedings of a Workshop: This publication summarizes the current challenges and future possibilities of cryptography. [NM17]
- Cryptographic Agility and Its Relation to Circular Encryption: Researches whether wPRFs (weak-PRFs) are agile and whether every secure (IND-R) encryption scheme is secure when encrypting cycles. [ABB10]
- Cryptographic Agility in practice: emerging use-cases: In this paper the authors attempt to develop a common understanding of cryptographic agility. [MH19]
- Cryptographic Agility: This article covers cryptographic beliefs and cryptographic agility. [S09]
- Enterprise Agility: Accelerating enterprise agility: In this book, the authors give advice how to prepare your company to navigate the rapidly-moving business world. [M18]
- Fail-Safe-Konzept für Public-Key-Infrastrukturen: In dieser Dissertation wird ein Fail-Safe-Konzept für Public-Key-Infrastrukturen vorgestellt. [M02]
- Fluid Intelligence Doesn’t Matter! Effects of Code Examples on the Usability of Crypto APIs: Researches whether similarity and Gf also have an effect in the context of using cryptographic APIs [MW20]
- Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms: Provides guidelines to ensure that protocols have the ability to migrate from one mandatory-to-implement algorithm suite to another over time. [H15]
- Lightweight and adaptable solution for security agility.: The authors propose a lightweight cryptographically agile agreementmodel, which is formally verified. They also present a solution in the Agile CryptographicAgreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. [VMV16]
- On the State of Crypto Agility: Survey of the current state of Crypto Agility [ASW22]
- On the importance of cryptographic agility for industrial automation: Preparing industrial systems for the quantum computing era: This work motivates cryptographic agility by discussing the threat of quantum computers to modern cryptography [PN19]
- Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques:: The paper focusing is on the established cryptographic methods and how current security protocols can be adapted against quantum attacks. [GAB19]
- Post-Quantum Software Updates: In this paper the authors detail the troubles we encountered when using hash-based signatures in practice and study the most important use case for hash-based signatures: software or code signing. [GFL19]
- Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Algorithm Agility: This document updates the Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) standard (RFC 4556) to remove protocol structures tied to specific cryptographic algorithms. [AZC19]
- Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems: This paper proposes a multi-domain PKI architecture for intelligent transportation systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, today [UWK15]
- Security Agility Solution Independent of the Underlaying Protocol Architecture.: The agilecryptographic negotiation protocol (ACNP) proposed in this paper repre-sents a layer-agnostic, robust solution that can be deployed for providingcryptographic agility and greatly improve security. [VM12]
- Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation): Next Generation from Microsoft to exchange cryptographic algorithms without any change to the code of the program [LLP13]
- Sicherheitsrisiko Quantencomputer: In this publication, the authors cover why quantum computers pose a big problem for todays security. [Q21]
- Systemic Flexibility and Business Agility: This book presents a conceptual framework of the key dimensions of business excellence. [S15]
- The Crypto-Agility Properties: In this paper, the authors discuss the motivations and relate some works and the best practices to achieve crypto- agility. [MO18]
- The Secure Socket API: TLS as an Operating System Service: We explore the use of the standard POSIX socket API as a vehicle for a simplified TLS API, while also giving administrators the ability to control applications and tailor TLS configuration to their needs. [OHW18]
- Usability and Security Effects of Code Examples on Crypto APIs: Platform for cryptographic code examples that improves the usability and security of created applications by non security experts [MW18]
- Zur Benutzbarkeit und Verwendung von API-Dokumentationen: Showcases requirements for a good security API [HZH20]
- post-quantum crypto agility: Utimaco provides solutions which are quantum proof as well as compliant to industry regulations and combines this with a crypto-agile overall setup, allowing for rapid upgrades to new status quos with low involvement of costs and manpower. [U18]
Last modified June 6, 2022