Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

by   S. E. Yunakovsky, et al.

Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments. We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions. Although our primary focus is on the attacks with quantum computing, we also discuss some security issues that are not directly related to the used cryptographic algorithms but are essential for the overall security of the PKI. We attempt to provide a set of security recommendations regarding the PKI from the viewpoints of attacks with quantum computers.


Fast Quantum Algorithm for Solving Multivariate Quadratic Equations

In August 2015 the cryptographic world was shaken by a sudden and surpri...

The Engineering of Software-Defined Quantum Key Distribution Networks

Quantum computers will change the cryptographic panorama. A technology o...

Cybersecurity for Quantum Computing

With rising cyberattack frequency and range, Quantum Computing companies...

A Comprehensive Analysis of Quantum E-voting Protocols

Recent advances at Google, IBM, as well as a number of research groups i...

Reinforcing Security and Usability of Crypto-Wallet with Post-Quantum Cryptography and Zero-Knowledge Proof

Crypto-wallets or digital asset wallets are a crucial aspect of managing...

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

The evolution of quantum computers poses a serious threat to contemporar...

Please sign up or login with your details

Forgot password? Click here to reset