X.509 Information Security Certification Based on Post-Quantum Cryptography

Abel C. H. Chen
DOI: https://doi.org/10.1109/ICSSES62373.2024.10561274
2024-08-05
Abstract:In recent years, with the advancement of quantum computing, mainstream asymmetric cryptographic methods in the current Public Key Infrastructure (PKI) systems are gradually being threatened. Therefore, this study explores X.509 security certificates based on Post-Quantum Cryptography (PQC) and discusses implemented solutions. This study compares mainstream asymmetric cryptographic methods (including RSA and Elliptic Curve Digital Signature Algorithm (ECDSA)) with standard PQC methods (including Falcon, Dilithium, SPHINCS+), comparing the efficiency of certificate generation, signature generation, and signature verification. Finally, recommendations for a solution based on PQC for X.509 security certificates are proposed.
Cryptography and Security,Software Engineering
What problem does this paper attempt to address?
The paper primarily focuses on the application of post-quantum cryptography in X.509 information security certificates, aiming to address the potential quantum computing threats faced by mainstream asymmetric cryptographic techniques used in current Public Key Infrastructure (PKI) systems. Specifically, with the development of quantum computing technology, existing PKI systems based on RSA and Elliptic Curve Digital Signature Algorithm (ECDSA) are challenged. To solve this problem, the paper explores how to apply Post-Quantum Cryptography (PQC) to X.509 information security certificates and implements a feasible solution. The main contributions of the paper include: 1. **Integration of Post-Quantum Cryptography with X.509 Certificates**: The paper explores the possibility of applying post-quantum cryptography to X.509 certificates and proposes corresponding solutions. 2. **Performance Comparison**: The paper compares the efficiency of traditional asymmetric cryptographic techniques and standard post-quantum cryptographic techniques (such as Falcon, Dilithium, and SPHINCS+) in generating X.509 certificates, generating signatures, and verifying signatures. 3. **Experimental Analysis**: Through experimental evaluation of different post-quantum cryptographic techniques, the paper provides specific data on certificate length, certificate generation time, signature generation time, and signature verification time. In conclusion, the paper recommends a solution for X.509 information security certificates based on post-quantum cryptography and looks forward to future research directions, suggesting that the research results be extended to scenarios such as Transport Layer Security (TLS) protocols.