Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

EPJ Quantum Technology - Tập 8 - Trang 1-19 - 2021
Sergey E. Yunakovsky1,2, Maxim Kot1,2, Nikolay Pozhar1,2, Denis Nabokov1,2, Mikhail Kudinov1,2, Anton Guglya1,2, Evgeniy O. Kiktenko1,2, Ekaterina Kolycheva3, Alexander Borisov3, Aleksey K. Fedorov1,2
1QApp, Moscow, Russia
2Russian Quantum Center, Moscow, Russia
3Bosch Corp. Sector Res. & Adv. Eng., Saint Petersburg, Russia

Tóm tắt

Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments. We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions. Although our primary focus is on the attacks with quantum computing, we also discuss some security issues that are not directly related to the used cryptographic algorithms but are essential for the overall security of the PKI. We attempt to provide a set of security recommendations regarding the PKI from the viewpoints of attacks with quantum computers.

Tài liệu tham khảo

Adams C, Lloyd S. Understanding PKI: concepts, standards, and deployment considerations. 2nd ed. Reading: Addison-Wesley; 2002.

See Report by Digicert: Are you ready for the quantum leap?

Zalka C. Shor’s algorithm with fewer (pure) qubits. quant-ph/0601097 (2006).

Gouzien E, Sangouard N. Factoring 2048 RSA integers in 177 days with 13436 qubits and a multimode memory. arXiv:2103.06159.

https://www.idquantique.com/quantum-safe-security/overview/.

https://goqrate.com.

Regev O. The learning with errors problem. In: Proceedings of the IEEE 25th annual conference on computational complexity. 2010. p. 191–204.

Naehrig M, Alkim E, Bos J, Ducas L, Easterbrook K, LaMacchia B, Longa P, Mironov I, Nikolaenko V, Peikert C, Raghunathan A, Stebila D. FrodoKEM. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.

Schwabe P, Avanzi R, Bos J, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck JM, Seiler G, Stehle D. CRYSTALS-KYBER. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.

Alkim E, Avanzi R, Bos J, Ducas L, de la Piedra, Pöppelmann T, Schwabe P, Stebila D. NewHope. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.

Lyubashevsky V, et al. CRYSTALS-Dilithium. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.

Casanova A, Faugère J-C, Macario-Rat G, Patarin J, Perret L, Ryckeghem J. GeMSS: a Great Multivariate Short Signature. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.

Beullens W, Preneel B, Szepieniec A, Vercauteren F. LUOV. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.

Ding J, et al. Rainbow. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.

Zhang S. Promised and distributed quantum search computing and combinatorics. Lect Notes Comput Sci. 2005;3595:430.

Becker A, Joux A, May A, Meurer A. Decoding random binary linear codes in \(2^{n}/20\): how \(1+1 = 0\) improves information set decoding. Lect Notes Comput Sci. 2012;7237:520.

Bernstein DJ. Grover vs. McEliece. Lect Notes Comput Sci. 2010;6061:73.

McGrew D, Curcio M, Fluhrer S. Leighton-Micali Hash-Based Signatures, RFC 8554 (2019).

Bernstein DJ, Hülsing A, Kölbl S, Niederhagen R, Rijneveld J, Schwabe P. SPHINCS+. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.

Kudinov M, Kiktenko E, Fedorov A. Official Comments (Round 3) – SPHINCS+. https://csrc.nist.gov/CSRC/media/Projects/post-quantum-cryptography/documents/round-3/official-comments/Sphincs-Plus-round3-official-comment.pdf. Accessed 05 Aug 2020.

Chase M, et al. The picnic signature scheme. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.

NIST. Post-Quantum Cryptography Standardization Webpage. https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization.

Alagic G, et al. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. https://csrc.nist.gov/publications/detail/nistir/8309/final. Accessed 05 Aug 2020.

https://csrc.nist.gov/publications/detail/fips/140/2/final.

Coppersmith D. In: Proceedings of the EUROCRYPT 1996: advances in cryptology – EUROCRYPT ‘96. 1996. p. 178–89.