Post Quantum Cryptography: Readiness Challenges and the Approaching
Storm
- URL: http://arxiv.org/abs/2101.01269v1
- Date: Mon, 4 Jan 2021 22:55:15 GMT
- Title: Post Quantum Cryptography: Readiness Challenges and the Approaching
Storm
- Authors: Matt Campagna, Brian LaMacchia, and David Ott
- Abstract summary: Recent advances in quantum computing signal that we are on the cusp of our next cryptographic algorithm transition.
This transition represents a major disruption within the IT industry.
By preparing now, we can ensure a more orderly, less costly, and minimally disruptive changeover.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: While advances in quantum computing promise new opportunities for scientific
advancement (e.g., material science and machine learning), many people are not
aware that they also threaten the widely deployed cryptographic algorithms that
are the foundation of today's digital security and privacy. From mobile
communications to online banking to personal data privacy, literally billions
of Internet users rely on cryptography every day to ensure that private
communications and data stay private. Indeed, the emergence and growth of the
public Internet and electronic commerce was arguably enabled by the invention
of public-key cryptography. The key advantage offered by public-key
cryptography is that it allows two parties who have never communicated
previously to nevertheless establish a secure, private, communication channel
over a non-private network (e.g., the Internet).
Recent advances in quantum computing signal that we are on the cusp of our
next cryptographic algorithm transition, and this transition to post-quantum
cryptography will be more complicated and impact many more systems and
stakeholders, than any of the prior migrations. This transition represents a
major disruption within the IT industry and will broadly impact nearly every
domain of our digital lives, from global commerce to social media to government
and more. Cryptographic algorithm transitions take time and involve an
extensive coordination effort across many stakeholders who are involved in
building and operating the world's compute infrastructure. By preparing now for
the upcoming transition to these new algorithms, we can ensure a more orderly,
less costly, and minimally disruptive changeover.
Related papers
- Post-Quantum Cryptography: Securing Digital Communication in the Quantum Era [0.0]
Post-quantum cryptography (PQC) is a critical field aimed at developing resilient cryptographic algorithms to quantum attacks.
This paper delineates the vulnerabilities of classical cryptographic systems to quantum attacks, elucidates impervious principles of quantum computing, and introduces various PQC algorithms.
arXiv Detail & Related papers (2024-03-18T12:51:56Z) - Bi-CryptoNets: Leveraging Different-Level Privacy for Encrypted
Inference [4.754973569457509]
We decompose the input data into sensitive and insensitive segments according to importance and privacy.
The sensitive segment includes some important and private information such as human faces.
We take strong homomorphic encryption to keep security, whereas the insensitive one contains some background and we add perturbations.
arXiv Detail & Related papers (2024-02-02T10:35:05Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Designing Hash and Encryption Engines using Quantum Computing [2.348041867134616]
We explore quantum-based hash functions and encryption to fortify data security.
The integration of quantum and classical methods demonstrates potential in securing data in the era of quantum computing.
arXiv Detail & Related papers (2023-10-26T14:49:51Z) - Towards Fast and Scalable Private Inference [2.2702420046035865]
New paradigm of computing exists, which we refer to as privacy-preserving (PPC)
PPC technologies can be leveraged for secure outsourced computation or to enable two parties to compute without revealing either users' secret data.
Despite their phenomenal potential to revolutionize user protection in the digital age, the realization has been limited due to exorbitant computational, communication, and storage overheads.
arXiv Detail & Related papers (2023-07-09T00:55:30Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - When Quantum Information Technologies Meet Blockchain in Web 3.0 [86.91054991998273]
We introduce a quantum blockchain-driven Web 3.0 framework that provides information-theoretic security for decentralized data transferring and payment transactions.
We discuss the potential applications and challenges of implementing quantum blockchain in Web 3.0.
arXiv Detail & Related papers (2022-11-29T05:38:42Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Faster Secure Data Mining via Distributed Homomorphic Encryption [108.77460689459247]
Homomorphic Encryption (HE) is receiving more and more attention recently for its capability to do computations over the encrypted field.
We propose a novel general distributed HE-based data mining framework towards one step of solving the scaling problem.
We verify the efficiency and effectiveness of our new framework by testing over various data mining algorithms and benchmark data-sets.
arXiv Detail & Related papers (2020-06-17T18:14:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.