A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies

被引:6
作者
Hasan, Khondokar Fida [1 ]
Simpson, Leonie [2 ]
Baee, Mir Ali Rezazadeh [2 ]
Islam, Chadni [2 ]
Rahman, Ziaur [2 ]
Armstrong, Warren [3 ]
Gauravaram, Praveen [4 ]
McKague, Matthew [2 ]
机构
[1] Univ New South Wales UNSW, Canberra Sch Profess Studies, Canberra, ACT 2601, Australia
[2] Queensland Univ Technol QUT, Sch Comp Sci, Brisbane, Qld 4000, Australia
[3] QuintessenceLabs Pty Ltd, Canberra, ACT 2609, Australia
[4] Tata Consultancy Serv Ltd, Cybersecur Res & Innovat, Brisbane, Qld 4000, Australia
关键词
Cryptography; Security; Quantum computing; Computers; NIST; Australia; Standards; Quantum cryptography; Threat modeling; enterprise security; information security; post-quantum cryptography; PQC migration; quantum threat;
D O I
10.1109/ACCESS.2024.3360412
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum computing is emerging as a significant threat to information protected by widely used cryptographic systems. Cryptographic methods, once deemed secure for decades, are now at risk of being compromised, posing a massive threat to the security of sensitive data and communications across enterprises worldwide. As a result, there is an urgent need to migrate to quantum-resistant cryptographic systems. This is no simple task. Migrating to a quantum-safe state is a complex process, and many organisations lack the in-house expertise to navigate this transition without guidance. In this paper, we present a comprehensive framework designed to assist enterprises with this migration. Our framework outlines essential steps involved in the cryptographic migration process, and leverages existing organisational inventories. The framework facilitates the efficient identification of cryptographic assets and can be integrated with other enterprise frameworks smoothly. To underscore its practicality and effectiveness, we have incorporated case studies that utilise graph-theoretic techniques to pinpoint and assess cryptographic dependencies. This is useful in prioritising crypto-systems for replacement.
引用
收藏
页码:23427 / 23450
页数:24
相关论文
共 74 条
  • [1] AG Department, 2018, Protective Security Policy Framework
  • [2] Amazim, AWS CLI 1.27.145 Command Reference (ND) Configure
  • [3] [Anonymous], 2015, Guide To Securing Personal Information: 'Reasonable Steps To Protect Personal Information
  • [4] [Anonymous], 2022, PQC Standardization Process: Announcing Four Candidates to be Standardized Plus Fourth Round Candidates
  • [5] [Anonymous], Planning for Post-Quantum Cryptography
  • [6] [Anonymous], 2022, Future Forward Readiness: Quantum Risk
  • [7] [Anonymous], Information Security Classification Framework (QGISCF)
  • [8] [Anonymous], POSTQUANTUM CRYPTOGR
  • [9] [Anonymous], 2014, 55000: Asset Management-overview, Principles and Terminology
  • [10] [Anonymous], 2020, PQC Standardization Process: Third Round Candidate Announcement