Transitioning organizations to post-quantum cryptography
- PMID: 35546191
- DOI: 10.1038/s41586-022-04623-2
Transitioning organizations to post-quantum cryptography
Abstract
Quantum computers are expected to break modern public key cryptography owing to Shor's algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant algorithms, also known as post-quantum cryptography (PQC) algorithms. The PQC research field has flourished over the past two decades, leading to the creation of a large variety of algorithms that are expected to be resistant to quantum attacks. These PQC algorithms are being selected and standardized by several standardization bodies. However, even with the guidance from these important efforts, the danger is not gone: there are billions of old and new devices that need to transition to the PQC suite of algorithms, leading to a multidecade transition process that has to account for aspects such as security, algorithm performance, ease of secure implementation, compliance and more. Here we present an organizational perspective of the PQC transition. We discuss transition timelines, leading strategies to protect systems against quantum attacks, and approaches for combining pre-quantum cryptography with PQC to minimize transition risks. We suggest standards to start experimenting with now and provide a series of other recommendations to allow organizations to achieve a smooth and timely PQC transition.
© 2022. Springer Nature Limited.
Similar articles
-
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.Sensors (Basel). 2023 Jun 6;23(12):5379. doi: 10.3390/s23125379. Sensors (Basel). 2023. PMID: 37420546 Free PMC article.
-
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture.Sensors (Basel). 2023 Nov 25;23(23):9408. doi: 10.3390/s23239408. Sensors (Basel). 2023. PMID: 38067782 Free PMC article.
-
A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.Sensors (Basel). 2022 Jan 9;22(2):489. doi: 10.3390/s22020489. Sensors (Basel). 2022. PMID: 35062450 Free PMC article.
-
Post-Quantum Security: Opportunities and Challenges.Sensors (Basel). 2023 Oct 26;23(21):8744. doi: 10.3390/s23218744. Sensors (Basel). 2023. PMID: 37960442 Free PMC article. Review.
-
Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data.Heliyon. 2024 May 16;10(10):e31406. doi: 10.1016/j.heliyon.2024.e31406. eCollection 2024 May 30. Heliyon. 2024. PMID: 38826742 Free PMC article. Review.
Cited by
-
Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs.Sensors (Basel). 2023 Nov 14;23(22):9172. doi: 10.3390/s23229172. Sensors (Basel). 2023. PMID: 38005557 Free PMC article.
-
Application and Development of QKD-Based Quantum Secure Communication.Entropy (Basel). 2023 Apr 6;25(4):627. doi: 10.3390/e25040627. Entropy (Basel). 2023. PMID: 37190415 Free PMC article. Review.
-
Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network.Entropy (Basel). 2023 Nov 16;25(11):1548. doi: 10.3390/e25111548. Entropy (Basel). 2023. PMID: 37998240 Free PMC article.
-
Technology Roadmap for Flexible Sensors.ACS Nano. 2023 Mar 28;17(6):5211-5295. doi: 10.1021/acsnano.2c12606. Epub 2023 Mar 9. ACS Nano. 2023. PMID: 36892156 Free PMC article. Review.
-
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.J Cloud Comput (Heidelb). 2023;12(1):37. doi: 10.1186/s13677-023-00414-w. Epub 2023 Mar 11. J Cloud Comput (Heidelb). 2023. PMID: 36937653 Free PMC article.
References
-
- Shor, P. W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In Proc. 35th Annual Symposium on Foundations of Computer Science 124–134 (Soc. Industr. Appl. Math., 1994). Shor’s quantum algorithm demonstrated how to factorize large integers in polynomial time, which is an exponential speed-up over the best classical algorithms.
-
- Bernstein, D. J. & Lange, T. Post-quantum cryptography. Nature 549, 188–194 (2017). - DOI
-
- Arute, F. et al. Quantum supremacy using a programmable superconducting processor. Nature 574, 505–510 (2019). - DOI
-
- Gidney, C. & Ekerå, M. How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum 5, 433 (2021). Gidney and Ekerå describe the resources required to implement Shor’s algorithm to break today’s standard cryptography, assuming noisy qubits. - DOI
-
- Bennett, C. H. & Brassard, G. Quantum cryptography: public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing 175–179 (1984).
Publication types
LinkOut - more resources
Full Text Sources
Research Materials
Miscellaneous