A Security Assessment tool for Quantum Threat Analysis
- URL: http://arxiv.org/abs/2407.13523v1
- Date: Thu, 18 Jul 2024 13:58:34 GMT
- Title: A Security Assessment tool for Quantum Threat Analysis
- Authors: Basel Halak, Cristian Sebastian Csete, Edward Joyce, Jack Papaioannou, Alexandre Pires, Jin Soma, Betul Gokkaya, Michael Murphy,
- Abstract summary: The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption.
A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in insecure transit.
This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world.
- Score: 34.94301200620856
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption. A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in transit insecure. This threat is expected to materialize within the next 20 years. Immediate transition to quantum-resilient cryptographic schemes is crucial, primarily to mitigate store-now-decrypt-later attacks and to ensure the security of products with decade-long operational lives. This transition requires a systematic approach to identifying and upgrading vulnerable cryptographic implementations. This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world. The work included a systematic evaluation of the proposed solution using qualitative feedback from network administrators and cybersecurity experts. This feedback was used to refine the accuracy and usability of the assessment process. The results demonstrate its effectiveness and usefulness in helping organizations prepare for quantum computing threats. The assessment tool is publicly available at (https://quantum-watch.soton.ac.uk).
Related papers
- Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure [0.04096453902709291]
This analysis explores the impact of quantum computing on critical infrastructure and cloud services.
We advocate for proactive security strategies and collaboration between sectors to develop and implement quantum-resistant cryptography.
This blueprint strengthens each area's defenses against potential quantum-induced cyber threats.
arXiv Detail & Related papers (2024-04-16T15:36:23Z) - Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Study for Quantum-Safe Migration [0.03749861135832072]
The rise of large-scale quantum computing poses a significant threat to traditional cryptographic security measures.
Quantum attacks undermine current asymmetric cryptographic algorithms, rendering them ineffective.
This study explores the challenges of migrating to quantum-safe cryptographic states.
arXiv Detail & Related papers (2024-04-12T04:18:58Z) - Assessing the Benefits and Risks of Quantum Computers [0.7224497621488283]
We review what is currently known on the potential uses and risks of quantum computers.
We identify 2 large-scale trends -- new approximate methods and the commercial exploration of business-relevant quantum applications.
We conclude there is a credible expectation that quantum computers will be capable of performing computations which are economically-impactful.
arXiv Detail & Related papers (2024-01-29T17:21:31Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Assessment of cryptographic approaches for a quantum-resistant Galileo OSNMA [4.281182764767519]
We analyse the state of the Galileo Open Service Navigation Message Authentication (OSNMA) to overcome these new threats.
The main barrier to adopting the PQC approach is the size of both the signature and the key.
This work concludes by assessing different temporal countermeasures that can be implemented to sustain the system's integrity in the short term.
arXiv Detail & Related papers (2023-12-18T10:20:50Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - When Quantum Information Technologies Meet Blockchain in Web 3.0 [86.91054991998273]
We introduce a quantum blockchain-driven Web 3.0 framework that provides information-theoretic security for decentralized data transferring and payment transactions.
We discuss the potential applications and challenges of implementing quantum blockchain in Web 3.0.
arXiv Detail & Related papers (2022-11-29T05:38:42Z) - NEQRX: Efficient Quantum Image Encryption with Reduced Circuit Complexity [2.7985570786346745]
We propose an efficient implementation scheme for a quantum image encryption algorithm combining the generalized affine transform and logistic map.
We achieve a remarkable 50% reduction in cost while maintaining security and efficiency.
arXiv Detail & Related papers (2022-04-14T10:15:23Z) - The Computational and Latency Advantage of Quantum Communication
Networks [70.01340727637825]
This article summarises the current status of classical communication networks.
It identifies some critical open research challenges that can only be solved by leveraging quantum technologies.
arXiv Detail & Related papers (2021-06-07T06:31:02Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.