A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
- URL: http://arxiv.org/abs/2409.07852v2
- Date: Fri, 13 Sep 2024 16:42:33 GMT
- Title: A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
- Authors: Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun,
- Abstract summary: Quantum computing poses a significant global threat to today's security mechanisms.
Security experts and public sectors have issued guidelines to help organizations migrate their software to post-quantum cryptography (PQC)
There is a lack of (semi-)automatic tools to support this transition especially when software is used and deployed as binary executables.
- Score: 3.0982846350824613
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum computing poses a significant global threat to today's security mechanisms. As a result, security experts and public sectors have issued guidelines to help organizations migrate their software to post-quantum cryptography (PQC). Despite these efforts, there is a lack of (semi-)automatic tools to support this transition especially when software is used and deployed as binary executables. To address this gap, in this work, we first propose a set of requirements necessary for a tool to detect quantum-vulnerable software executables. Following these requirements, we introduce QED: a toolchain for Quantum-vulnerable Executable Detection. QED uses a three-phase approach to identify quantum-vulnerable dependencies in a given set of executables, from file-level to API-level, and finally, precise identification of a static trace that triggers a quantum-vulnerable API. We evaluate QED on both a synthetic dataset with four cryptography libraries and a real-world dataset with over 200 software executables. The results demonstrate that: (1) QED discerns quantum-vulnerable from quantum-safe executables with 100% accuracy in the synthetic dataset; (2) QED is practical and scalable, completing analyses on average in less than 4 seconds per real-world executable; and (3) QED reduces the manual workload required by analysts to identify quantum-vulnerable executables in the real-world dataset by more than 90%. We hope that QED can become a crucial tool to facilitate the transition to PQC, particularly for small and medium-sized businesses with limited resources.
Related papers
- Performance and Storage Analysis of CRYSTALS Kyber as a Post Quantum Replacement for RSA and ECC [49.1574468325115]
CRYSTALS-Kyber is a post-quantum cryptographic solution standardized by NIST in 2022.<n>This study evaluates Kyber's practical viability through performance testing across various implementation schemes.
arXiv Detail & Related papers (2025-08-03T09:53:45Z) - qlbm -- A Quantum Lattice Boltzmann Software Framework [0.0]
We present qlbm, a Python software package designed to facilitate the development, simulation, and analysis of Quantum Lattice Boltzmann Methods (QBMs)
qlbm is a modular framework that introduces a quantum component abstraction hierarchy tailored to the implementation of novel QBMs.
We demonstrate the versatility of the software by showcasing multiple QBMs in 2D and 3D with complex boundary conditions, integrated within automated benchmarking utilities.
arXiv Detail & Related papers (2024-11-29T02:41:07Z) - Non-Interactive Oblivious Transfer and One-Time Programs from Noisy Quantum Storage [0.0]
Non-interactive chosen-input OT (one-shot OT) is equivalent to a One-Time Memory (OTM)<n>One-Time Programs execute on an arbitrary input without revealing anything about their internal workings.<n>We leverage quantum resources in the Noisy-Quantum-Storage Model to achieve these goals.
arXiv Detail & Related papers (2024-10-10T20:54:09Z) - A Security Assessment tool for Quantum Threat Analysis [34.94301200620856]
The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption.
A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in insecure transit.
This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world.
arXiv Detail & Related papers (2024-07-18T13:58:34Z) - A Quantum Automatic Tool for Finding Impossible Differentials [12.997422492640766]
We propose two quantum automatic tools for searching impossible differentials.
The proposed quantum algorithms exploit the idea of miss-in-the-middle and the properties of truncated differentials.
arXiv Detail & Related papers (2024-07-14T03:00:24Z) - PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud [7.87660609586004]
Cloud computing poses a high risk of data leakage in quantum machine learning (QML)
We propose a co-design framework for preserving the data security of QML with the Q paradigm, namely PristiQ.
arXiv Detail & Related papers (2024-04-20T22:03:32Z) - QuantumSEA: In-Time Sparse Exploration for Noise Adaptive Quantum
Circuits [82.50620782471485]
QuantumSEA is an in-time sparse exploration for noise-adaptive quantum circuits.
It aims to achieve two key objectives: (1) implicit circuits capacity during training and (2) noise robustness.
Our method establishes state-of-the-art results with only half the number of quantum gates and 2x time saving of circuit executions.
arXiv Detail & Related papers (2024-01-10T22:33:00Z) - A Primer on Security of Quantum Computing [5.510992382274774]
Quantum computing can potentially transform several application areas by solving intractable problems from classical domain.
Quantum computing stack may contain sensitive Intellectual Properties (IP) that requires protection.
Quantum computers suffer from crosstalk that couples two programs in a multi-tenant setting to facilitate traditionally known fault injection attacks.
arXiv Detail & Related papers (2023-05-04T02:30:27Z) - Potential and limitations of quantum extreme learning machines [55.41644538483948]
We present a framework to model QRCs and QELMs, showing that they can be concisely described via single effective measurements.
Our analysis paves the way to a more thorough understanding of the capabilities and limitations of both QELMs and QRCs.
arXiv Detail & Related papers (2022-10-03T09:32:28Z) - Iterative Qubits Management for Quantum Index Searching in a Hybrid
System [56.39703478198019]
IQuCS aims at index searching and counting in a quantum-classical hybrid system.
We implement IQuCS with Qiskit and conduct intensive experiments.
Results demonstrate that it reduces qubits consumption by up to 66.2%.
arXiv Detail & Related papers (2022-09-22T21:54:28Z) - QSAN: A Near-term Achievable Quantum Self-Attention Network [73.15524926159702]
Self-Attention Mechanism (SAM) is good at capturing the internal connections of features.
A novel Quantum Self-Attention Network (QSAN) is proposed for image classification tasks on near-term quantum devices.
arXiv Detail & Related papers (2022-07-14T12:22:51Z) - On exploring the potential of quantum auto-encoder for learning quantum systems [60.909817434753315]
We devise three effective QAE-based learning protocols to address three classically computational hard learning problems.
Our work sheds new light on developing advanced quantum learning algorithms to accomplish hard quantum physics and quantum information processing tasks.
arXiv Detail & Related papers (2021-06-29T14:01:40Z) - Electronic structure with direct diagonalization on a D-Wave quantum
annealer [62.997667081978825]
This work implements the general Quantum Annealer Eigensolver (QAE) algorithm to solve the molecular electronic Hamiltonian eigenvalue-eigenvector problem on a D-Wave 2000Q quantum annealer.
We demonstrate the use of D-Wave hardware for obtaining ground and electronically excited states across a variety of small molecular systems.
arXiv Detail & Related papers (2020-09-02T22:46:47Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.