Log In Sign Up

Post Quantum Cryptography: Readiness Challenges and the Approaching Storm

by   Matt Campagna, et al.

While advances in quantum computing promise new opportunities for scientific advancement (e.g., material science and machine learning), many people are not aware that they also threaten the widely deployed cryptographic algorithms that are the foundation of today's digital security and privacy. From mobile communications to online banking to personal data privacy, literally billions of Internet users rely on cryptography every day to ensure that private communications and data stay private. Indeed, the emergence and growth of the public Internet and electronic commerce was arguably enabled by the invention of public-key cryptography. The key advantage offered by public-key cryptography is that it allows two parties who have never communicated previously to nevertheless establish a secure, private, communication channel over a non-private network (e.g., the Internet). Recent advances in quantum computing signal that we are on the cusp of our next cryptographic algorithm transition, and this transition to post-quantum cryptography will be more complicated and impact many more systems and stakeholders, than any of the prior migrations. This transition represents a major disruption within the IT industry and will broadly impact nearly every domain of our digital lives, from global commerce to social media to government and more. Cryptographic algorithm transitions take time and involve an extensive coordination effort across many stakeholders who are involved in building and operating the world's compute infrastructure. By preparing now for the upcoming transition to these new algorithms, we can ensure a more orderly, less costly, and minimally disruptive changeover.


page 1

page 2

page 3

page 4


The Impact of Quantum Computing on Present Cryptography

The aim of this paper is to elucidate the implications of quantum comput...

Intuitive Understanding of Quantum Computation and Post-Quantum Cryptography

Post-quantum cryptography is inevitable. National Institute of Standards...

Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility

The implications of sufficiently large quantum computers for widely used...

Post-Quantum Cryptography Algorithms Standardization and Performance Analysis

Quantum computer is no longer a hypothetical idea. It is the worlds most...

The impact of quantum computing on real-world security: A 5G case study

This paper provides a detailed analysis of the impact of quantum computi...

Design and Hardware Implementation of a Separable Image Steganographic Scheme Using Public-key Cryptosystem

In this paper, a novel and efficient hardware implementation of steganog...

PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography

Privacy is a major issue in learning from distributed data. Recently the...