Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis

07/13/2023
by   Khondokar Fida Hasan, et al.
0

Quantum computing is emerging as an unprecedented threat to the current state of widely used cryptographic systems. Cryptographic methods that have been considered secure for decades will likely be broken, with enormous impact on the security of sensitive data and communications in enterprises worldwide. A plan to migrate to quantum-resistant cryptographic systems is required. However, migrating an enterprise system to ensure a quantum-safe state is a complex process. Enterprises will require systematic guidance to perform this migration to remain resilient in a post-quantum era, as many organisations do not have staff with the expertise to manage this process unaided. This paper presents a comprehensive framework designed to aid enterprises in their migration. The framework articulates key steps and technical considerations in the cryptographic migration process. It makes use of existing organisational inventories and provides a roadmap for prioritising the replacement of cryptosystems in a post-quantum context. The framework enables the efficient identification of cryptographic objects, and can be integrated with other frameworks in enterprise settings to minimise operational disruption during migration. Practical case studies are included to demonstrate the utility and efficacy of the proposed framework using graph theoretic techniques to determine and evaluate cryptographic dependencies.

READ FULL TEXT

page 1

page 5

page 6

page 13

page 15

page 16

research
01/11/2023

Managing the Migration to Post-Quantum-Cryptography

Cryptographically relevant quantum computers (CRQC) are presumably able ...
research
09/16/2019

Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility

The implications of sufficiently large quantum computers for widely used...
research
03/09/2019

Post-Quantum Cryptographic Hardware Primitives

The development and implementation of post-quantum cryptosystems have be...
research
11/18/2019

The impact of quantum computing on real-world security: A 5G case study

This paper provides a detailed analysis of the impact of quantum computi...
research
01/10/2020

QSOR: Quantum-Safe Onion Routing

In this work, we propose a study on the use of post-quantum cryptographi...
research
01/04/2021

Post Quantum Cryptography: Readiness Challenges and the Approaching Storm

While advances in quantum computing promise new opportunities for scient...
research
01/23/2018

Post-Quantum Cryptography: Riemann Primitives and Chrysalis

The Chrysalis project is a proposed method for post-quantum cryptography...

Please sign up or login with your details

Forgot password? Click here to reset