Quantum Advancements in Securing Networking Infrastructures

被引:1
作者
Salloum, Hadi [1 ,2 ]
Alawir, Murhaf [1 ,2 ]
Alatasi, Mohammad Anas [1 ,2 ]
Asekrea, Saleem [1 ,2 ]
Mazzara, Manuel [2 ]
Bahrami, Mohammad Reza [1 ,2 ]
机构
[1] QDeep, Innopolis, Russia
[2] Innopolis Univ, Innopolis, Russia
来源
ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 6, AINA 2024 | 2024年 / 204卷
关键词
Post-Quantum Cryptography; Quantum Key Distribution; Networking Infrastructures; Security; Quantum Computing;
D O I
10.1007/978-3-031-57942-4_34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a exploration into the integration of Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC) within networking infrastructures, marking a groundbreaking advancement in network security. It meticulously examines the vulnerabilities inherent in classical and post-quantum cryptographic methods, underlining the pressing necessity for a shift towards quantum-based security paradigms. The crux of novelty lies in the comprehensive analysis of implementing QKD and PQC strategies within networking systems, providing innovative insights into their fusion for heightened security measures. This integration not only addresses existing cryptographic vulnerabilities but also spearheads a transformative approach to fortify networking infrastructures against evolving threats. Furthermore, the paper anticipates and scrutinizes the forthcoming threats and opportunities in the quantum era, offering a forward-thinking perspective to navigate the dynamic landscape of network security.
引用
收藏
页码:354 / 363
页数:10
相关论文
共 28 条
[1]   Cybersecurity Challenges Associated With the Internet of Things in a Post-Quantum World [J].
Althobaiti, Ohood Saud ;
Dohler, Mischa .
IEEE ACCESS, 2020, 8 :157356-157381
[2]   Enabling Secure and Trustworthy Quantum Networks: Current State-of-the-Art, Key Challenges, and Potential Solutions [J].
Bajric, Samed .
IEEE ACCESS, 2023, 11 :128801-128809
[3]   Post-Quantum and Code-Based Cryptography-Some Prospective Research Directions [J].
Balamurugan, Chithralekha ;
Singh, Kalpana ;
Ganesan, Ganeshvani ;
Rajarajan, Muttukrishnan .
CRYPTOGRAPHY, 2021, 5 (04)
[4]  
Charjan S., 2015, Int. J., V5, P1
[5]  
Eddin S., 2024, INT C ADV INF NETW A
[6]   Implementation vulnerabilities in general quantum cryptography [J].
Huang, Anqi ;
Barz, Stefanie ;
Andersson, Erika ;
Makarov, Vadim .
NEW JOURNAL OF PHYSICS, 2018, 20
[7]   A new post-quantum multivariate polynomial public key encapsulation algorithm [J].
Kuang, Randy ;
Perepechaenko, Maria ;
Barbeau, Michel .
QUANTUM INFORMATION PROCESSING, 2022, 21 (10)
[8]  
Mackey GeorgeW., 2013, Mathematical Foundations of Quantum Mechanics
[9]  
McMahon D, 2008, QUANTUM COMPUTING EXPLAINED, P1
[10]   Quantum Key Distribution: A Networking Perspective [J].
Mehic, Miralem ;
Niemiec, Marcin ;
Rass, Stefan ;
Ma, Jiajun ;
Peev, Momtchil ;
Aguado, Alejandro ;
Martin, Vicente ;
Schauer, Stefan ;
Poppe, Andreas ;
Pacher, Christoph ;
Voznak, Miroslav .
ACM COMPUTING SURVEYS, 2020, 53 (05)