Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition

被引:0
|
作者
Baseri, Yaser [1 ]
Chouhan, Vikas [2 ]
Ghorbani, Ali [2 ]
Chow, Aaron [3 ]
机构
[1] Univ Montreal, Dept Comp Sci & Operat Res, Montreal, PQ, Canada
[2] Univ New Brunswick, Canadian Inst Cybersecur CIC, Fredericton, NB, Canada
[3] Scotiabank, Toronto, ON, Canada
关键词
Quantum security; Risk assessment; Quantum-safe migration; STRIDE threat analysis; CYBERSECURITY;
D O I
10.1016/j.cose.2024.104272
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of large-scale quantum computing poses a significant threat to traditional cryptographic security measures. Quantum attacks, particularly targeting the mathematical foundations of current asymmetric cryptographic algorithms, render them ineffective. Even standard symmetric key cryptography is susceptible, albeit to a lesser extent, with potential security enhancements through longer keys or extended hash function outputs. Consequently, the cryptographic solutions currently employed to safeguard data will be inadequately secure and vulnerable to emerging quantum technology threats. In response to this impending quantum menace, organizations must chart a course towards quantum-safe environments, demanding robust business continuity plans and meticulous risk management throughout the migration process. This study provides an in-depth exploration of the challenges associated with migrating from a non-quantum-safe cryptographic state to one resilient against quantum threats. We introduce a comprehensive security risk assessment framework that scrutinizes vulnerabilities across algorithmic, certificate, and protocol layers, covering the entire migration journey, including pre-migration, through-migration, and post-migration stages. Our methodology links identified vulnerabilities to the well-established STRIDE threat model, establishing precise criteria for evaluating their potential impact and likelihood throughout the migration process. Moving beyond theoretical analysis, we address vulnerabilities practically, especially within critical components like cryptographic algorithms, public key infrastructures, and network protocols. Our study not only identifies potential attacks and vulnerabilities at each layer and migration stage but also suggests possible countermeasures and alternatives to enhance system resilience, empowering organizations to construct a secure infrastructure for the quantum era. Through these efforts, we establish the foundation for enduring security in networked systems amid the challenges of the quantum era.
引用
收藏
页数:31
相关论文
共 50 条
  • [31] SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain
    Dolev, Shlomi
    Wang, Ziyu
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 247 - 256
  • [32] Quantum-safe cryptography:crossroads of coding theory and cryptography
    Jiabo WANG
    Ling LIU
    Shanxiang LYU
    Zheng WANG
    Mengfan ZHENG
    Fuchun LIN
    Zhao CHEN
    Liuguo YIN
    Xiaofu WU
    Cong LING
    ScienceChina(InformationSciences), 2022, 65 (01) : 95 - 115
  • [33] Quantum-safe cryptography: crossroads of coding theory and cryptography
    Wang, Jiabo
    Liu, Ling
    Lyu, Shanxiang
    Wang, Zheng
    Zheng, Mengfan
    Lin, Fuchun
    Chen, Zhao
    Yin, Liuguo
    Wu, Xiaofu
    Ling, Cong
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [34] A Quantum-Safe User Authentication Protocol for the Internet of Things
    Roy, Kumar Sekhar
    Kalita, Hemanta Kumar
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2019, 10 (03): : 178 - 192
  • [35] KeyShield: A Scalable and Quantum-Safe Key Management Scheme
    Al-darwbi, Mohammed Y.
    Ghorbani, Ali A.
    Lashkari, Arash Habibi
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 87 - 101
  • [36] A Generic IoT Quantum-Safe Watchdog Timer Protocol
    Eckel, Michael
    Gutsche, Tanja
    Lauer, Hagen
    Rein, Andre
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [37] No Sum (NS) Sequence: A Tool for Quantum-Safe Cryptography
    Rawal, Bharat S.
    Biswas, Anjan
    Singh, Raman
    CONTEMPORARY MATHEMATICS, 2024, 5 (03): : 4095 - 4114
  • [38] QUANTUM-SAFE IDENTITY-BASED BROADCAST ENCRYPTION WITH PROVABLE SECURITY FROM MULTIVARIATE CRYPTOGRAPHY
    Sarkar, Ramprasad
    Mandal, Mriganka
    Mukhopadhyay, Sourav
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024, 18 (03) : 814 - 827
  • [39] Authenticating Edge Neural Network through Hardware Security Modules and Quantum-Safe Key Management
    Vembu, Swathi Kumar
    Chattopadhyay, Anupam
    Saha, Sayandeep
    PROCEEDINGS OF THE 37TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, VLSID 2024 AND 23RD INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, ES 2024, 2024, : 318 - 323
  • [40] A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTESAE in 5G Scenario
    Arul, Rajakumar
    Raja, Gunasekaran
    Almagrabi, Alaa Omran
    Alkatheiri, Mohammed Saeed
    Chauhdary, Sajjad Hussain
    Bashir, Ali Kashif
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (01) : 681 - 690