Classic public key cryptography, for example key exchanges based on Diffie-Hellman (both finite field and elliptic curve) and digital signatures based on the RSA cryptosystem, is vulnerable to compromise from a quantum computer adversary. There is a strong market need to define post-quantum protocols that support algorithms that are resistant to attacks by quantum computers (a.k.a. quantum-resistant) in the standard to address this anticipated vulnerability. As an example, the United States National Institute of Science and Technology (NIST) will disallow use of key establishment and digital signatures based on[SO2.1] classic cryptography for use in US government systems after 2035. NIST has published new post-quantum algorithms for use in key establishment and digital signature protocols. In addition, the European Commission encourages Member States to develop comprehensive national strategies for PQC adoption. It is believed that these requirements will also appear in other market verticals (e.g., consumer, financial, etc.).
This amendment extends 802.11 security to support algorithms for post-quantum cryptography (PQC). The extension specifies:
Main documents
Achievements
Continue to discuss Contributions
Main documents
Achievements
The main achievements of this meeting:
Main documents
Achievements
The main achievements of this meeting were to address comments to the PAR and CSD and submit for LMSC/SASB/NesCom approval
Main documents
Achievements
The main achievements of this meeting were
USEFUL LINKS TO OTHER SITES:
IEEE P802.11 WLANs RELATED
OTHER SITES
This page is maintained by sorr@cisco.com. Comments are welcome.