{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T06:40:23Z","timestamp":1743403223985,"version":"3.40.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11623-025-2063-x","type":"journal-article","created":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T06:20:39Z","timestamp":1743402039000},"page":"164-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Der lange Weg zur quantenresistenten PKI"],"prefix":"10.1007","volume":"49","author":[{"given":"Hans-Joachim","family":"Knobloch","sequence":"first","affiliation":[]},{"given":"Noah","family":"Freising","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,28]]},"reference":[{"key":"2063_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7","volume-title":"Post-Quantum Cryptography","year":"2009","unstructured":"D. J. Bernstein, J. Buchmann, und E. Dahmen, Hrsg., Post-Quantum Cryptography. Berlin, Heidelberg: Springer, 2009. https:\/\/doi.org\/10.1007\/978-3-540-88702-7."},{"key":"2063_CR2","unstructured":"F. K. Wilhelm, R. Steinwandt, D. Zeuch, und J. Frey, \u201eEntwicklungsstand Quantencomputer\u201c, Version 2.0, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Aug. 2023."},{"key":"2063_CR3","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology, \u201eModule-Lattice-Based Digital Signature Standard\u201c, U.S. Department of Commerce, Federal Information Processing Standard (FIPS) 204 (Draft), Aug. 2023. https:\/\/doi.org\/10.6028\/NIST.FIPS.204.ipd.","DOI":"10.6028\/NIST.FIPS.204.ipd"},{"key":"2063_CR4","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology, \u201eStateless Hash-Based Digital Signature Standard\u201c, U.S. Department of Commerce, Federal Information Processing Standard (FIPS) 205 (Draft), Aug. 2023. https:\/\/doi.org\/10.6028\/NIST.FIPS.205.ipd.","DOI":"10.6028\/NIST.FIPS.205.ipd"},{"key":"2063_CR5","unstructured":"B. Westerbaan, \u201eThe state of the post-quantum Internet\u201c, The Cloudflare Blog. Zugegriffen: 23. April 2024. [Online]. Verf\u00fcgbar unter: https:\/\/blog.cloudflare.com\/pq-2024"},{"key":"2063_CR6","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-031-30589-4_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2023","author":"W Castryck","year":"2023","unstructured":"W. Castryck und T. Decru, \u201eAn Efficient Key Recovery Attack on\u00a0SIDH\u201c, in Advances in Cryptology \u2013 EUROCRYPT 2023, C. Hazay und M. Stam, Hrsg., Cham: Springer Nature Switzerland, 2023, S. 423\u2013447. https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15."},{"key":"2063_CR7","unstructured":"\u201eKryptographische Verfahren: Empfehlungen und Schl\u00fcssell\u00e4ngen\u201c, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Feb. 2024. Zugegriffen: 17. M\u00e4rz 2024. [Online]. Verf\u00fcgbar unter: https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/TechGuidelines\/TG02102\/BSI-TR-02102-1.pdf?__blob=publicationFile&v=7"},{"key":"2063_CR8","unstructured":"D. O\u2019Brien, \u201eProtecting Chrome Traffic with Hybrid Kyber KEM\u201c, Chromium Blog. Zugegriffen: 22. M\u00e4rz 2024. [Online]. Verf\u00fcgbar unter: https:\/\/blog.chromium.org\/2023\/08\/protecting-chrome-traffic-with-hybrid.html"},{"key":"2063_CR9","unstructured":"\u201eBlog \u2013 iMessage with PQ3: The new state of the art in quantum-secure messaging at scale \u2013 Apple Security Research\u201c, Apple Security Research. Zugegriffen: 22. April 2024. [Online]. Verf\u00fcgbar unter: https:\/\/security.apple.com\/blog\/imessage-pq3\/"},{"key":"2063_CR10","unstructured":"S. Ehlen u.\u00a0a., \u201eKryptografie quantensicher gestalten\u201c, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Okt. 2021."},{"key":"2063_CR11","unstructured":"S. Schmieg, S. K\u00f6lbl, und G. Endignoux, \u201eBlog: Google\u2019s Threat model for Post-Quantum Cryptography\u201c. Zugegriffen: 17. Mai 2024. [Online]. Verf\u00fcgbar unter: https:\/\/bughunters.google.com\/blog\/5108747984306176\/google-s-threat-model-for-post-quantum-cryptography"},{"issue":"5","key":"2063_CR12","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2018.3761723","volume":"16","author":"M Mosca","year":"2018","unstructured":"M. Mosca, \u201eCybersecurity in an Era with Quantum Computers: Will We Be Ready?\u201c, IEEE Security & Privacy, Bd.\u00a016, Nr.\u00a05, S. 38\u201341, Sep. 2018, https:\/\/doi.org\/10.1109\/MSP.2018.3761723.","journal-title":"IEEE Security & Privacy"},{"key":"2063_CR13","unstructured":"E. Rescorla, \u201eRFC 8446 \u2013The Transport Layer Security (TLS) Protocol Version 1.3\u201c, Zugegriffen: 10. Juli 2024. [Online]. Verf\u00fcgbar unter: https:\/\/datatracker.ietf.org\/doc\/html\/rfc8446"},{"key":"2063_CR14","unstructured":"C. Kaufman, P. Hoffman, Y. Nir, P. Eronen, T. Kivinen, \u201eRFC 7296 \u2013 Internet Key Exchange Protocol Version 2 (IKEv2)\u201c, Zugegriffen: 20. Oktober 2024. [Online]. Verf\u00fcgbar unter: https:\/\/datatracker.ietf.org\/doc\/html\/rfc7296OWAS"},{"key":"2063_CR15","unstructured":"CJ. Tjhai et al., \u201eRFC 9370 \u2013 Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2)\u201c, Zugegriffen: 20. Oktober 2024. [Online]. Verf\u00fcgbar unter: https:\/\/datatracker.ietf.org\/doc\/html\/rfc9370"},{"key":"2063_CR16","unstructured":"L. Zhu. B. Tung, \u201eRFC 4556 \u2013 Public Key Cryptography for Initial Authentication in Kerberos (PKINIT)\u201c, Zugegriffen: 20. Oktober 2024. [Online]. Verf\u00fcgbar unter: https:\/\/datatracker.ietf.org\/doc\/html\/rfc4556"},{"key":"2063_CR17","unstructured":"Microsoft, \u201e[MS-PKCA]: Public Key Cryptography for Initial Authentication (PKINIT) in Kerberos Protocol)\u201c, Version 21.0 vom 16.09.2024, Zugegriffen: 20. Oktober 2024. [Online]. Verf\u00fcgbar unter: https:\/\/winprotocoldoc.blob.core.windows.net\/productionwindowsarchives\/MS-PKCA\/%5bMS-PKCA%5d.pdf"},{"key":"2063_CR18","unstructured":"R. Housley, \u201eRFC 5652 \u2013 Cryptographic Message Syntax (CMS)\u201c, Zugegriffen: 20. Oktober 2024. [Online]. Verf\u00fcgbar unter: https:\/\/datatracker.ietf.org\/doc\/html\/rfc5652"},{"key":"2063_CR19","unstructured":"M. Jones, J. Bradley, N. Sakimura, \u201eRFC 7515 \u2013 JSON Web Signature (JWS)\u201c, Zugegriffen: 20. Oktober 2024. [Online]. Verf\u00fcgbar unter: https:\/\/datatracker.ietf.org\/doc\/html\/rfc7515"},{"key":"2063_CR20","unstructured":"S. Blank, P. Goldstein, T. Loder, T. Zink, M. Bradshaw, A. Brotman, \u201eBrand Indicators for Message Identification (BIMI)\u201c, Internet Engineering Task Force, Internet Draft draft-brand-indicators-for-message-identification-01, September 2024. Zugegriffen: 12. Oktober 2024. [Online]. Verf\u00fcgbar unter: https:\/\/datatracker.ietf.org\/doc\/html\/draft-brand-indicators-for-message-identification-06"},{"key":"2063_CR21","unstructured":"C. Bonnell, J. Gray, D. Hook, T. Okubo, und M. Ounsworth, \u201eA Mechanism for Encoding Differences in Paired Certificates\u201c, Internet Engineering Task Force, Internet Draft draft-bonnell-lamps-chameleon-certs-03, Jan. 2024. Zugegriffen: 23. Januar 2024. [Online]. Verf\u00fcgbar unter: https:\/\/datatracker.ietf.org\/doc\/draft-bonnell-lamps-chameleon-certs"},{"key":"2063_CR22","unstructured":"Noah Freising, \u201eEvaluierung von PKI-Software bez\u00fcglich der Unterst\u00fctzung quantenresistenter Zertifikate\u201c, Bachelorarbeit, Mai 2024."},{"key":"2063_CR23","unstructured":"\u201eEJBCA Community 8.3 Release Notes\u201c. Zugegriffen: 16. Juli 2024. [Online]. Verf\u00fcgbar unter: https:\/\/docs.keyfactor.com\/ejbca\/latest\/ejbca-community-8-3-release-notes"},{"key":"2063_CR24","unstructured":"M. Ounsworth, J. Gray, M. Pala, J. Klau\u00dfner, und S. Fluhrer, \u201eComposite ML-DSA for use in Internet PKI\u201c, Internet Engineering Task Force, Internet Draft draft-ietf-lamps-pq-composite-sigs-02, Juli 2024. Zugegriffen: 12. Oktober 2024. [Online]. Verf\u00fcgbar unter: https:\/\/datatracker.ietf.org\/doc\/draft-ietf-lamps-pq-composite-sigs"},{"key":"2063_CR25","unstructured":"National Security Agency, \u201eThe Commercial National Security Algorithm Suite 2.0 and Quantum Computing FAQ\u201c, Stand April 2024, Zugegriffen: 10. Juli 2024. [Online]. Verf\u00fcgbar unter: https:\/\/media.defense.gov\/2022\/Sep\/07\/2003071836\/-1\/-1\/1\/CSI_CNSA_2.0_FAQ_.PDF"},{"key":"2063_CR26","unstructured":"F. K. Wilhelm, R. Steinwandt, D. Zeuch, P. Lageyre und S.\u00a0Kirchhoff, \u201eEntwicklungsstand Quantencomputer\u201c, Version 2,1, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Aug. 2024."},{"key":"2063_CR27","unstructured":"OWASP Foundation \u2013 CycloneDX Feature Working Group on Cryptography, \u201eAuthoritative Guide to CBOM\u201c, April 2024, Zugegriffen: 06.02.2025. [Online]. Verf\u00fcgbar unter: https:\/\/cyclonedx.org\/guides\/OWASP_CycloneDX-Authoritative-Guide-to-CBOM-en.pdf"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2063-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-025-2063-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2063-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T06:20:43Z","timestamp":1743402043000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-025-2063-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["2063"],"URL":"https:\/\/doi.org\/10.1007\/s11623-025-2063-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"28 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}