Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

05/04/2021
by   S. E. Yunakovsky, et al.
0

Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments. We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions. Although our primary focus is on the attacks with quantum computing, we also discuss some security issues that are not directly related to the used cryptographic algorithms but are essential for the overall security of the PKI. We attempt to provide a set of security recommendations regarding the PKI from the viewpoints of attacks with quantum computers.

READ FULL TEXT
research
12/19/2017

Fast Quantum Algorithm for Solving Multivariate Quadratic Equations

In August 2015 the cryptographic world was shaken by a sudden and surpri...
research
04/10/2023

Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together

Most currently used cryptographic tools for protecting data are based on...
research
06/29/2019

The Engineering of Software-Defined Quantum Key Distribution Networks

Quantum computers will change the cryptographic panorama. A technology o...
research
10/27/2021

Cybersecurity for Quantum Computing

With rising cyberattack frequency and range, Quantum Computing companies...
research
10/11/2018

A Comprehensive Analysis of Quantum E-voting Protocols

Recent advances at Google, IBM, as well as a number of research groups i...
research
08/14/2023

Reinforcing Security and Usability of Crypto-Wallet with Post-Quantum Cryptography and Zero-Knowledge Proof

Crypto-wallets or digital asset wallets are a crucial aspect of managing...
research
04/29/2022

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

The evolution of quantum computers poses a serious threat to contemporar...

Please sign up or login with your details

Forgot password? Click here to reset