Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

被引:18
作者
Yunakovsky, Sergey E. [1 ,2 ]
Kot, Maxim [1 ,2 ]
Pozhar, Nikolay [1 ,2 ]
Nabokov, Denis [1 ,2 ]
Kudinov, Mikhail [1 ,2 ]
Guglya, Anton [1 ,2 ]
Kiktenko, Evgeniy O. [1 ,2 ]
Kolycheva, Ekaterina [3 ]
Borisov, Alexander [3 ]
Fedorov, Aleksey K. [1 ,2 ]
机构
[1] IQApp, Moscow 143025, Russia
[2] Russian Quantum Ctr, Moscow 143025, Russia
[3] Bosch Corp Sect Res & Adv Engn, St Petersburg, Russia
关键词
Post-quantum cryptography; Production environment; Public key infrastructure; ALGORITHMS; HFE;
D O I
10.1140/epjqt/s40507-021-00104-z
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments. We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions. Although our primary focus is on the attacks with quantum computing, we also discuss some security issues that are not directly related to the used cryptographic algorithms but are essential for the overall security of the PKI. We attempt to provide a set of security recommendations regarding the PKI from the viewpoints of attacks with quantum computers.
引用
收藏
页数:19
相关论文
共 78 条
[1]  
Alagic G., Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process
[2]   On the concrete hardness of Learning with Errors [J].
Albrecht, Martin R. ;
Player, Rachel ;
Scott, Sam .
JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (03) :169-203
[3]   More on average case vs approximation complexity [J].
Alekhnovich, M .
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, :298-307
[4]  
[Anonymous], REPORT DIGICERT ARE
[5]  
[Anonymous], 2002, Understanding PKI: Concepts, Standards, and Deployment Considerations
[6]  
[Anonymous], FRODOKEM
[7]   Variational Quantum Factoring [J].
Anschuetz, Eric ;
Olson, Jonathan ;
Aspuru-Guzik, Alan ;
Cao, Yudong .
QUANTUM TECHNOLOGY AND OPTIMIZATION PROBLEMS, 2019, 11413 :74-85
[8]  
Arora S, 2011, LECT NOTES COMPUT SC, V6755, P403, DOI 10.1007/978-3-642-22006-7_34
[9]   Quantum supremacy using a programmable superconducting processor [J].
Arute, Frank ;
Arya, Kunal ;
Babbush, Ryan ;
Bacon, Dave ;
Bardin, Joseph C. ;
Barends, Rami ;
Biswas, Rupak ;
Boixo, Sergio ;
Brandao, Fernando G. S. L. ;
Buell, David A. ;
Burkett, Brian ;
Chen, Yu ;
Chen, Zijun ;
Chiaro, Ben ;
Collins, Roberto ;
Courtney, William ;
Dunsworth, Andrew ;
Farhi, Edward ;
Foxen, Brooks ;
Fowler, Austin ;
Gidney, Craig ;
Giustina, Marissa ;
Graff, Rob ;
Guerin, Keith ;
Habegger, Steve ;
Harrigan, Matthew P. ;
Hartmann, Michael J. ;
Ho, Alan ;
Hoffmann, Markus ;
Huang, Trent ;
Humble, Travis S. ;
Isakov, Sergei V. ;
Jeffrey, Evan ;
Jiang, Zhang ;
Kafri, Dvir ;
Kechedzhi, Kostyantyn ;
Kelly, Julian ;
Klimov, Paul V. ;
Knysh, Sergey ;
Korotkov, Alexander ;
Kostritsa, Fedor ;
Landhuis, David ;
Lindmark, Mike ;
Lucero, Erik ;
Lyakh, Dmitry ;
Mandra, Salvatore ;
McClean, Jarrod R. ;
McEwen, Matthew ;
Megrant, Anthony ;
Mi, Xiao .
NATURE, 2019, 574 (7779) :505-+
[10]  
Becker A, 2012, LECT NOTES COMPUT SC, V7237, P520, DOI 10.1007/978-3-642-29011-4_31