Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

by   S. E. Yunakovsky, et al.

Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments. We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions. Although our primary focus is on the attacks with quantum computing, we also discuss some security issues that are not directly related to the used cryptographic algorithms but are essential for the overall security of the PKI. We attempt to provide a set of security recommendations regarding the PKI from the viewpoints of attacks with quantum computers.


Fast Quantum Algorithm for Solving Multivariate Quadratic Equations

In August 2015 the cryptographic world was shaken by a sudden and surpri...

Cybersecurity for Quantum Computing

With rising cyberattack frequency and range, Quantum Computing companies...

The Engineering of Software-Defined Quantum Key Distribution Networks

Quantum computers will change the cryptographic panorama. A technology o...

The impact of quantum computing on real-world security: A 5G case study

This paper provides a detailed analysis of the impact of quantum computi...

A Comprehensive Analysis of Quantum E-voting Protocols

Recent advances at Google, IBM, as well as a number of research groups i...

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

The evolution of quantum computers poses a serious threat to contemporar...

Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings

With the emerging of mobile communication technologies, we are entering ...