Two new papers published by UniBwM

We are happy to announce the publication of two new papers by Federico Valbusa, Bundeswehr University Munich.

Seamless Post-Quantum Transition: Agile and Efficient Encryption for Data-at-Rest

As quantum computing matures, its impact on traditional cryptographic protocols becomes increasingly critical, especially for data-at-rest scenarios where large data sets remain encrypted for extended periods of time. This paper addresses the pressing need to transition away from pre-quantum algorithms by presenting an agile cryptosystem that securely and efficiently supports post-quantum Key Encapsulation Mechanisms (KEMs).

Reed more here


Relaxing the Single Point of Failure in Quantum Key Distribution Networks: An Overview of Multi-path Approaches

Quantum Key Distribution (QKD) networks are receiving growing attention by researchers and funding agencies, with the largest projects spanning hundreds of kilometers and large, multi-national initiatives well under way. The growing scale of QKD networks poses some extra challenges, in particular due to the current impossibility of establishing end-to-end security between nodes: for large distances, reliance on intermediate trusted nodes is required, an aspect which increases the attack surface of QKD networks. A possible mitigation strategy for this problem lies in leveraging the complexity of the network: by making use of multiple paths and applying techniques issued from cryptography and/or error-correcting theory, it is possible to mitigate some attacks and force an adversary to compromise more nodes in the network.

This paper discusses relevant approaches to leverage multi-path aspects of QKD networks for increased security, analyzing the different security assumptions, guarantees, and performance of different techniques, and presenting their applicability to the different networks.

Reed more here


Connect with us

The project funded under Grant Agreement No. ​101190366​ is supported by the European Cybersecurity Competence CentreFunded by the European Union.
Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or European Cybersecurity Competence Centre.
Neither the European Union nor the granting authority can be held responsible for them.