Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition

被引:0
|
作者
Baseri, Yaser [1 ]
Chouhan, Vikas [2 ]
Ghorbani, Ali [2 ]
Chow, Aaron [3 ]
机构
[1] Univ Montreal, Dept Comp Sci & Operat Res, Montreal, PQ, Canada
[2] Univ New Brunswick, Canadian Inst Cybersecur CIC, Fredericton, NB, Canada
[3] Scotiabank, Toronto, ON, Canada
关键词
Quantum security; Risk assessment; Quantum-safe migration; STRIDE threat analysis; CYBERSECURITY;
D O I
10.1016/j.cose.2024.104272
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of large-scale quantum computing poses a significant threat to traditional cryptographic security measures. Quantum attacks, particularly targeting the mathematical foundations of current asymmetric cryptographic algorithms, render them ineffective. Even standard symmetric key cryptography is susceptible, albeit to a lesser extent, with potential security enhancements through longer keys or extended hash function outputs. Consequently, the cryptographic solutions currently employed to safeguard data will be inadequately secure and vulnerable to emerging quantum technology threats. In response to this impending quantum menace, organizations must chart a course towards quantum-safe environments, demanding robust business continuity plans and meticulous risk management throughout the migration process. This study provides an in-depth exploration of the challenges associated with migrating from a non-quantum-safe cryptographic state to one resilient against quantum threats. We introduce a comprehensive security risk assessment framework that scrutinizes vulnerabilities across algorithmic, certificate, and protocol layers, covering the entire migration journey, including pre-migration, through-migration, and post-migration stages. Our methodology links identified vulnerabilities to the well-established STRIDE threat model, establishing precise criteria for evaluating their potential impact and likelihood throughout the migration process. Moving beyond theoretical analysis, we address vulnerabilities practically, especially within critical components like cryptographic algorithms, public key infrastructures, and network protocols. Our study not only identifies potential attacks and vulnerabilities at each layer and migration stage but also suggests possible countermeasures and alternatives to enhance system resilience, empowering organizations to construct a secure infrastructure for the quantum era. Through these efforts, we establish the foundation for enduring security in networked systems amid the challenges of the quantum era.
引用
收藏
页数:31
相关论文
共 50 条
  • [21] Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques
    Grote, Olaf
    Ahrens, Andreas
    Benavente-Peces, Cesar
    PECCS: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2019, : 91 - 98
  • [22] Transitioning Towards Quantum-Safe Government Examining Stages of Growth Models for Quantum-Safe Public Key Infrastructure Systems
    Ini, Kong
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON THEORY AND PRACTICE OF ELECTRONIC GOVERNANCE, ICEGOV 2022, 2022, : 499 - 503
  • [23] Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication
    Safavi-Naini, Reihaneh
    Poostindouz, Alireza
    Lisy, Viliam
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [24] Quantum-Safe Trust for Vehicles: The Race Is Already On
    Gardiner, Michael
    Truskovsky, Alexander
    Neville-Neil, George
    Mashatan, Atefeh
    COMMUNICATIONS OF THE ACM, 2021, 64 (09) : 54 - 61
  • [25] Practical Quantum-Safe Voting from Lattices
    del Pino, Rafael
    Lyubashevsky, Vadim
    Neven, Gregory
    Seiler, Gregor
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1565 - 1581
  • [26] Quantum-Safe Puncturable Signatures With Their Application in Blockchain
    Jiang, Mei
    Li, Yannan
    Susilo, Willy
    Duong, Dung
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2761 - 2770
  • [27] Quantum-Safe HIBE: Does It Cost a Latte?
    Zhao, Raymond K.
    Mccarthy, Sarah
    Steinfeld, Ron
    Sakzad, Amin
    O'Neill, Maire
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2680 - 2695
  • [28] Quantum-Safe Puncturable Signatures With Their Application in Blockchain
    Jiang, Mei
    Li, Yannan
    Susilo, Willy
    Duong, Dung
    IEEE Transactions on Information Forensics and Security, 2024, 19 : 2761 - 2770
  • [29] Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum World
    Sinha, Sayani
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 47 - 78
  • [30] Machine Learning Ensures Quantum-Safe Blockchain Availability
    Seol, Jongho
    Kim, Jongyeop
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,