Transitioning organizations to post-quantum cryptography

被引:104
作者
Joseph, David [1 ]
Misoczki, Rafael [2 ]
Manzano, Marc [1 ]
Tricot, Joe [1 ]
Pinuaga, Fernando Dominguez [1 ]
Lacombe, Olivier [2 ]
Leichenauer, Stefan [1 ]
Hidary, Jack [1 ]
Venables, Phil [2 ]
Hansen, Royal [2 ]
机构
[1] SandboxAQ, Palo Alto, CA 94304 USA
[2] Google, Mountain View, CA 94043 USA
关键词
D O I
10.1038/s41586-022-04623-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Quantum computers are expected to break modern public key cryptography owing to Shor's algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant algorithms, also known as post-quantum cryptography (PQC) algorithms. The PQC research field has flourished over the past two decades, leading to the creation of a large variety of algorithms that are expected to be resistant to quantum attacks. These PQC algorithms are being selected and standardized by several standardization bodies. However, even with the guidance from these important efforts, the danger is not gone: there are billions of old and new devices that need to transition to the PQC suite of algorithms, leading to a multi decade transition process that has to account for aspects such as security, algorithm performance, ease of secure implementation, compliance and more. Here we present an organizational perspective of the PQC transition. We discuss transition timelines, leading strategies to protect systems against quantum attacks, and approaches for combining pre-quantum cryptography with PQC to minimize transition risks. We suggest standards to start experimenting with now and provide a series of other recommendations to allow organizations to achieve a smooth and timely PQC transition.
引用
收藏
页码:237 / 243
页数:7
相关论文
共 49 条
[1]  
Alagic G, 2016, INT C INF THEOR SEC, P4771
[2]  
Alagic Gorjan., 2019, STATUS REPORT 1 ROUN
[3]  
Alagic Gorjan., 2020, Status report on the second round of the nist post-quantum cryptography standardization process, DOI [10.6028/NIST.IR.8309, DOI 10.6028/NIST.IR.8309]
[4]   Security Economics and Critical National Infrastructure [J].
Anderson, Ross ;
Fuloria, Shailendra .
ECONOMICS OF INFORMATION SECURITY AND PRIVACY, 2010, :55-66
[5]  
[Anonymous], 2022, MEM IMPR CYB NAT SEC
[6]  
[Anonymous], 2012, 7896 NISTIR
[7]   Quantum supremacy using a programmable superconducting processor [J].
Arute, Frank ;
Arya, Kunal ;
Babbush, Ryan ;
Bacon, Dave ;
Bardin, Joseph C. ;
Barends, Rami ;
Biswas, Rupak ;
Boixo, Sergio ;
Brandao, Fernando G. S. L. ;
Buell, David A. ;
Burkett, Brian ;
Chen, Yu ;
Chen, Zijun ;
Chiaro, Ben ;
Collins, Roberto ;
Courtney, William ;
Dunsworth, Andrew ;
Farhi, Edward ;
Foxen, Brooks ;
Fowler, Austin ;
Gidney, Craig ;
Giustina, Marissa ;
Graff, Rob ;
Guerin, Keith ;
Habegger, Steve ;
Harrigan, Matthew P. ;
Hartmann, Michael J. ;
Ho, Alan ;
Hoffmann, Markus ;
Huang, Trent ;
Humble, Travis S. ;
Isakov, Sergei V. ;
Jeffrey, Evan ;
Jiang, Zhang ;
Kafri, Dvir ;
Kechedzhi, Kostyantyn ;
Kelly, Julian ;
Klimov, Paul V. ;
Knysh, Sergey ;
Korotkov, Alexander ;
Kostritsa, Fedor ;
Landhuis, David ;
Lindmark, Mike ;
Lucero, Erik ;
Lyakh, Dmitry ;
Mandra, Salvatore ;
McClean, Jarrod R. ;
McEwen, Matthew ;
Megrant, Anthony ;
Mi, Xiao .
NATURE, 2019, 574 (7779) :505-+
[8]  
Barker E., 2020, RECOMMENDATION KEY D
[9]  
Barker W., 2021, MIGRATION POSTQUANTU
[10]  
Barnum H., 2002, PROC 43 ANN IEEE S F