The anticipated duration of each of the three main steps is indicated in the chart below, broken down into 3-months periods. We pursue the design and analysis phase on the protocol level concurrently with the analysis and development of protection measures on the implementation level.
- Step 1 focuses on basic design decisions in the security model (Part A), making sure these decisions are compatible with the needs of property identification and expression for runtime verification. At the same time, in Part B we make sure that that we will invoke cryptographic primitives that can meaningfully be protected against side-channel attacks.
- Step 2 works out details of a quantum-safe AGKE solution at the protocol level (Part A), which relies on Step 1-A being well underway. Some tweaking of the security model might still be needed when conducting the formal security analysis. In Part B, we are transitioning from property expression to property compilation -- starting to translate the theoretical protocol description into executable code.
- Step 3 focuses on optimizing and fine-tweaking parameter choices (Part A), and in Part B we integrate and test now comprehensive protection mechanisms (side channel countermeasures, property monitors),
which should lead up to a complete quantum-safe solution for AGKE.
|
|
1st year |
2nd year |
3rd year |
|||||||||
|
Month: Milestones and deliverables |
1q |
2q |
3q |
4q |
1q |
2q |
3q |
4q |
1q |
2q |
3q |
4q |
|
|
|
|||||||||||
1. |
Kick-off meeting and setting roles |
|
|
|
|
|
|
|
|
|
|
|
|
Step 1-A: Choice of security model |
|
|
|
|
|
|
|
|
|
|
|
|
|
Step 1-B: Implementation security of cryptographic primitives |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Step 2-A: Identify candidate protocol |
|
|
|
|
|
|
|
|
|
|
|
|
Step 2-B: Identify protocol-level security mechanisms |
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Step 3-A: Protocol and parameter optimization |
|
|
|
|
|
|
|
|
|
|
|
|
Step 3-B: Deploy implementation-level security mechanisms |
|
|
|
|
|
|
|
|
|
|
|
|
|
4. |
Final Report & Dissemination |
|
|
|
|
|
|
|
|
|
|
|
|
|
Deliverables: |
|
|
|
|
D1 |
|
D2 |
D3 |
|
D4 |
|
D5 D6 |
|
Progress Reporting: |
|
M1 |
|
|
|
M2 |
|
|
|
M3 |
|
Final |