About 19 results
Open links in new tab
  1. Information on RFC 9340 » RFC Editor

    In this document, we attempt to lay down the framework and introduce some basic architectural principles for a quantum internet. This is intended for general guidance and general interest.

  2. Information on RFC 8774 » RFC Editor

    Apr 1, 2020 · The age of quantum networking is upon us, and with it comes "entanglement": a procedure in which a state (i.e., a bit) can be transferred instantly, with no measurable delay …

  3. Information on RFC 9583 » RFC Editor

    This document provides an overview of some applications expected to be used on the Quantum Internet and categorizes them. Some general requirements for the Quantum Internet are also …

  4. Information on RFC 8784 » RFC Editor

    The Internet Key Exchange Protocol Version 2 (IKEv2) is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later …

  5. Information on RFC 9629 » RFC Editor

    In recent years, cryptographers have been specifying Key Encapsulation Mechanism (KEM) algorithms, including quantum-secure KEM algorithms. This document defines conventions for …

  6. Information on RFC 9794 » RFC Editor

    Abstract One aspect of the transition to post-quantum algorithms in cryptographic protocols is the development of hybrid schemes that incorporate both post-quantum and traditional …

  7. Information on RFC 9867 » RFC Editor

    This specification defines an alternative way to provide protection against quantum computers, which is similar to the solution defined in RFC 8784, but it also protects the initial IKEv2 SA.

  8. Information on RFC 8391 » RFC Editor

    It is suitable for compact implementations, is relatively simple to implement, and naturally resists side-channel attacks. Unlike most other signature systems, hash-based signatures can so far …

  9. Information on RFC 8554 » RFC Editor

    Unlike many other signature systems, hash-based signatures would still be secure even if it proves feasible for an attacker to build a quantum computer. This document is a product of the …

  10. Information on RFC 9242 » RFC Editor

    This exchange can be used for transferring large amounts of data in the process of IKEv2 Security Association (SA) establishment. An example of the need to do this is using key exchange …