Skip to main content

Showing 1–3 of 3 results for author: Mattsson, J P

.
  1. arXiv:2407.07444  [pdf, other

    cs.CR

    EDHOC is a New Security Handshake Standard: An Overview of Security Analysis

    Authors: Elsa López Pérez, Inria Göran Selander, John Preuß Mattsson, Thomas Watteyne, Mališa Vučinić

    Abstract: The paper wraps up the call for formal analysis of the new security handshake protocol EDHOC by providing an overview of the protocol as it was standardized, a summary of the formal security analyses conducted by the community, and a discussion on open venues for future work.

    Submitted 10 July, 2024; originally announced July 2024.

    Journal ref: IEEE Computer Society, 2024

  2. arXiv:2112.00399  [pdf

    cs.CR

    Quantum-Resistant Cryptography

    Authors: John Preuß Mattsson, Ben Smeets, Erik Thormarker

    Abstract: Quantum-resistant cryptography is cryptography that aims to deliver cryptographic functions and protocols that remain secure even if large-scale fault-tolerant quantum computers are built. NIST will soon announce the first selected public-key cryptography algorithms in its Post-Quantum Cryptography (PQC) standardization which is the most important current effort in the field of quantum-resistant c… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

  3. Nori: Concealing the Concealed Identifier in 5G

    Authors: John Preuß Mattsson, Prajwol Kumar Nakarmi

    Abstract: IMSI catchers have been a long standing and serious privacy problem in pre-5G mobile networks. To tackle this, 3GPP introduced the Subscription Concealed Identifier (SUCI) and other countermeasures in 5G. In this paper, we analyze the new SUCI mechanism and discover that it provides very poor anonymity when used with the variable length Network Specific Identifiers (NSI), which are part of the 5G… ▽ More

    Submitted 14 June, 2021; v1 submitted 21 May, 2021; originally announced May 2021.

    Comments: 9 pages, 8 figures, 1 table

    Report number: ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security

    Journal ref: 2021