Cryptography is the core building block in providing security to digital communications and enabling secure internet networking. The security of cryptographic algorithms relies on the underlying computational hardness problems like integer factorization (used in RSA) and discrete logarithm (used in Elliptic Curve Cryptography) problems. Quantum computing threatens to solve integer factorization and discrete logarithm problems in polynomial time using Shor's algorithm. To prepare for the quantum era and withstand the attacks equipped with quantum computing, the security and cryptography communities are designing new quantum-resistant public-key ciphers. Digital networking protocols must transition to using these new quantum-resistant or post-quantum cryptography (PQC) ciphers for secure internet networking in the quantum era. Transitioning to the PQC cipher use in digital networking protocols without analyzing the performance overheads and memory requirements has the potential to disrupt internet networking. My research investigates the performance impacts and security vulnerabilities associated with the transition to PQC. My research focuses on developing schemes to enable secure transition to PQC and protect digital communications in the quantum era.
Timeline of events triggering PQC (Events in blue are specific to NIST):
Digital signature algorithm performance results:
Related Publications: ACNS 2021, IEEE ICCCN 2021, ISC 2022, ACM WiSec 2022, IEEE EuCNC/6G Summit 2023
PT- Symmetric quantum mechanics provides an additional degree of freedom, absent in the regular Hermitian case, which significantly enhances the quantum Fisher information and reduces variance. We use the additional degree of freedom to develop schemes for estimating Bayesian parameters and bias in randomness. In our approach, the evolution of a qubit controlled by a PT- symmetric Hamiltonian is realized by the dilation method using ancilla qubit. We conduct experiments on IBM quantum processors to test correspondence between the theoretical and experimental likelihood distributions. Our research focuses on bridging the gap between PT -symmetric quantum mechanics and its practical applications in quantum information science.
PT-Symmetric evolution on IBM Quantum Experience:
Wireless technologies use device IDs to protect user privacy. My research explores and develops schemes to dynamically update the user IDs to prevent unauthorized tracking. We focus on lightweight and low-latency schemes to efficiently defend from various tracking approaches.Â
User ID generation scheme: