2 tayangan

Diunggah oleh blablablou

Post quantum cryptography

- Types of Cryptography
- A New Secure Approach for Message Transmission by Godelization and FCE
- btc-guide
- Network Security and Cryptology
- As 4019.8-1992 Information Technology - Open Systems Interconnection - The Directory Authentication Framework
- Classical Number Theory based Vs Chaos based Cryptography for Wireless Sensor Networks: A Research Perspective
- 07 Perlner Quantum
- Classification of Authentication Protocols: A Practical Approach
- IRJET-Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme
- Secure Checkpointing Approach for Mobile Environment
- 6.13.18Presentation
- kaliski-crypto-long-term-neu-ccis-2004
- cns
- Unit 12 - Digital Signature
- CSE403 network security
- Paper Key Escrow
- IJETTCS-2014-08-08-91
- Crypto and Digital Signatures
- Color Cryptography
- NETWORK SECURITY & CRYPTOGRAPHY

Anda di halaman 1dari 5

cryptography

Protect todays data against

tomorrow's threats

A quantum computer is a new type of computer that is based on

large consequences for organisations that work quantum mechanical principles. They are still in development,

but the concept of quantum computers dates back to the

with encrypted data. Using a quantum computer,

eighties. Several parties are working to build advanced

1

it becomes possible to decrypt data that is quantum computers.

secured with the most popular forms of

The inner workings of a quantum computer are fundamentally

cryptography. After the arrival of quantum different from a classical computer. For example, a quantum

computer will be much faster at solving some problems than a

computers, data that is currently sufficiently

classical computer. This makes the development of quantum

secured will not be so anymore. The computers valuable for solving complicated scientific

problems.

consequences are even more serious than that:

Target audience

encrypted data could be intercepted now, in

order to decrypt it with a quantum computer in Information security officers

IT managers

the future. The NCSC recommends organisations

to draft a plan of action. This plan of action

The following parties have contributed to

should clarify in which timeframe measures need this factsheet:

to be taken to protect data against quantum Betaalvereniging Nederland, KPN CISO, Ministry of Security and

computers. Justice, NL-NCSA, Peter Schwabe (RU), PQCRYPTO-EU (Tanja

Lange)

1

Source:

https://www.aivd.nl/publicaties/publicaties/2014/11/20/informatieblad-

over-quantumcomputers

The properties of quantum computers also enable breaking the a quantum computer can work out the private key that is used

most popular forms of cryptography. for a digital signature. Using this private key, the attacker can

generate new signatures and thereby impersonate someone

Cryptographic algorithms used for key exchange and generating else.

digital signatures are based on mathematical problems that are

supposedly hard to solve. A classical computer has a hard time To ensure the continued confidentiality of data and integrity of

solving these problems, but to a quantum computer they are digital signatures after the arrival of quantum computers, forms

significantly less complicated. An attacker with a quantum of cryptography are necessary that are resistant to quantum

computer can therefore decrypt a large part of the encrypted computers.

2

information that is sent via the internet. Using a quantum

computer, it is also possible to compromise the integrity of

Quantum algorithms

digital signatures.

Breaking cryptography on a quantum computer is done with

Quantum computers that are advanced enough to perform special algorithms that can only run on a quantum computer:

these tasks do not yet exist. The TU Delft expects to build an quantum algorithms.

advanced quantum computer between 2030 and 2040.

Companies like Google, Microsoft, IBM and Intel are also Shor's algorithm is a quantum algorithm that breaks popular

working to develop quantum computers, and it appears large cryptographic algorithms for key exchange and digital

3

intelligence services are interested as well. signatures (asymmetric cryptography). Cryptographic

algorithms such as RSA, ECDSA and Diffie-Hellman are no

At first, governments and scientists will be the primary users of longer safe then.

this new technology. The probability that consumers will have a

physical quantum computer in their living room is - also given Using Grover's algorithm, another quantum algorithm, attackers

the cost - very small. can search faster for encryption keys or passwords.4 Grover's

algorithm, however, is relatively slow. When sufficiently long

On the other hand, it's quite probable that quantum computers keys or passwords are used, Grover's algorithm is not effective.

will become available as cloud applications soon after their Research project PQCRYPTO-EU therefore recommends the use

arrival. This makes the technology - including its capacity for of 256 bit keys for AES.5

breaking popular cryptography - available to individuals.

In the rest of this factsheet, the term 'quantum computer' will Why should my organisation care today

denote an advanced quantum computer, which is capable of about the arrival of quantum computers?

breaking the most popular forms of cryptography. Encrypted data may be intercepted already today, in order to

decrypt it with a quantum computer in the future. This data is

stored awaiting the quantum computer, for example by parties

What does the arrival of quantum

that are interested in your organisation. After the arrival of

computers mean for my organisation?

quantum computers, this data is no longer sufficiently secured,

The arrival of quantum computers has large consequences for

as the cryptographic algorithm that was used can be broken.

organisations that work with encrypted data. More specifically,

Data that exists today and that should be protected after the

this holds for data that can be intercepted by a third party. This

arrival of quantum computers, should therefore already be

is data, for example, that is transmitted via the internet or that

additionally secured.

is published online after a data breach.

Using a quantum computer, data that is encrypted using the What does the NCSC recommend?

The NCSC recommends organisations to draft a plan of action.

most popular forms of cryptography can be decrypted.

This plan of action should clarify in which timeframe measures

Therefore, data that is currently sufficiently secured will not be

need to be taken to protect data against quantum computers.

so anymore after the arrival of quantum computers.

Using a quantum computer, it will also become possible to

already start additionally securing data? Take a look at the latest

compromise the integrity of digital signatures. An attacker with

2

Source: https://security.googleblog.com/2016/07/experimenting-with-

4

post-quantum.html The term 'encryption' covers all forms of symmetric encryption, such as

3

Source: AES, Salsa20, 3DES and RC4.

5

https://www.aivd.nl/publicaties/publicaties/2014/11/20/informatieblad- See https://pqcrypto.eu.org/recommend.html for the most recent

over-quantumcomputers recommendations.

6

recommendations of PQCRYPTO-EU. This project researches that is used. Consider for example the difference between

forms of cryptography that remain secure after the arrival of data exchange between two computers and the data

quantum computers. exchange of a smartcard.

Does no data exist within your organisation that should be - The implementation time. This is the time the organisation

secured until after the arrival of quantum computers? In that needs to switch to new forms of cryptography. This time is

case, wait before switching to new forms of cryptography. needed to for example formulating policy and replacing

Waiting has the advantage that better and better forms of hardware and software.

cryptography that can resist attacks with a quantum computer

will become available. - The availability of new forms of cryptography. Research is

currently underway into the development of cryptography

that is secure after the arrival of quantum computers. It will

Digital signatures

be some time yet until cryptography that is secure against

In some cases, digital signatures should already be additionally quantum computers is standardised and is implemented in

protected as well. hardware and software.

Digital signatures are used in products that will still be used Perspective for action

after the arrival of quantum computers. Devices in the Internet

of Things are an example, in the sense that they may verify - Gather involved people in your organisation. Determine

external commands using digital signatures. together the norms to which secured data and/or digital

signatures should adhere. This differs between different types

When quantum computers exist, these products can no longer of data. Determine which types of data are exchanged within

reliably verify digital signatures. An attacker with a quantum your organisation, how long these should be protected and in

computer can forge a digital signature in order to give these which way these are exchanged. Connect these efforts to

devices malicious instructions. existing methods for data classification within your

organisation.

It is important to switch to stronger forms of cryptography for - Determine the moment upon which you expect quantum

generating and verifying these signatures, because of the long computers to become available.

service life of these products. - For each type of data, make a timeline that clarifies when the

organisation should start additional data protections. When

making this decision, consider the time that data should be

The plan of action depends on several factors

protected, the estimated moment at which suitable, new

- The estimated moment upon which quantum computers

cryptography that is secure against quantum computers

become available. No one knows exactly when people will

becomes available, the time necessary to implement this

succeed in building a quantum computer. Nevertheless,

solution and the period left to wait before acting.

estimate the moment when you think quantum computers

- Determine the plan of action. In it, establish the suitable

will exist. Choosing this moment is, in essence, a form of risk

form of cryptography for each category of data in your

acceptance. The later the moment you choose, the more

organisation.

likely it is that quantum computers will exist before that date.

- The time during which data has to remain secure. How can data already be protected against

Differences exist between organisations and between types of quantum computers?

data in how long they have to remain secure. Some data has a The development of cryptographic algorithms that are secure

lifetime until after the moment that the first quantum against quantum computers yields - in time - better and better

computer becomes available. This data has to be protected solutions.

with cryptography that cannot be broken by a quantum

computer. Other data has a shorter lifetime or is no longer Post-quantum cryptography is the collective noun for all forms

sensitive by the time quantum computers arrive. of cryptography that remain secure after the arrival of quantum

computers. This includes both symmetric and asymmetric

- The way in which data is used. Different types of data are forms of cryptography.

used and secured in different ways. Every type of data will

have different performance demands on the cryptography Beside the research of the aforementioned European research

project PQCRYPTO-EU, the National Institute of Standards and

6

See https://pqcrypto.eu.org/recommend.html for the most recent

recommendations.

7

Technology (NIST) of the United States has opened a request to The cryptographic algorithms used to generate digital

develop standardised forms of post-quantum cryptography. signatures can be stateful or stateless. Stateful algorithms are only

usable to securely generate digital signatures in a limited

Encryption number of cases. They require faithfully maintaining a so-called

When encrypting data, a larger key is needed to make the state, an internal status value, which makes their application

cryptographic algorithm that is used secure against quantum much more complex. Stateless algorithms do not have this

computers. AES-128 is, for example, strong enough to secure limitation.

against an attacker with classical means, but not against an

attacker with a quantum computer. Research project

8 Quantum Key Distribution

PQCRYPTO-EU therefore recommends 256 bit keys for AES.

At this time, Quantum Key Distribution is not a suitable

Key exchange alternative to post-quantum cryptography.12

All popular forms of cryptography that are used for key

exchange are no longer secure after the arrival of quantum In contrast to traditional cryptography, which is based on hard-

computers. to-solve mathematical problems, Quantum Key Distribution is a

form of cryptography that is based on physical principles.

Exchanging keys manually can be a good solution if it is

necessary to start additionally protecting data today. However, However, Quantum Key Distribution still has several

this solution is not always feasible. In the case of limitations.12 The security properties of Quantum Key

communication between two data centers, one can imagine Distribution are currently insufficiently understood. Also,

using manual key exchange - with smartcards, for example. For Quantum Key Distribution requires the use of very costly

regular internet communications, this solution is less suitable. hardware, which both the sender and the receiver of the data

need to possess. Finally, the geographic range of this hardware

In addition to full replacement, you can also supplement is limited.

existing cryptographic key exchange with manual key exchange.

The outer layer of encryption is done with the cryptographically

exchanged key. Within this layer, encryption is performed with Finally

The arrival of quantum computers may seem like a long way off,

the manually exchanged key. The outer layer protects against

but the consequences for organisations that work with sensitive

attackers with classical means, whereas the inner layer protects

data are present today. Even though the supply of alternative

against attackers with a quantum computer.

forms of cryptography is still limited, it is essential to start

thinking today about forms of cryptography that your

Digital signatures

organisation has to implement, and the time that it needs to do

Methods of post-quantum cryptography used for digital

so.

signatures and key exchange currently know several limitations.

These limitations concern the performance or usability of these

9

methods. Furthermore, the security of many proposals for

these methods of post-quantum cryptography are not yet

10

sufficiently supported by mathematical research. Finally, these

forms of post-quantum cryptography need to be implemented

in popular hardware and software.

SPHINCS-256 as a method for stateless digital signatures and

11

XMSS as a method for stateful digital signatures.

7

See http://csrc.nist.gov/groups/ST/post-quantum-

crypto/workshops.html

8

See https://pqcrypto.eu.org/recommend.html for the most recent

recommendations.

9

Bron:

https://www.aivd.nl/publicaties/publicaties/2015/04/15/bereid-u-voor-op-

de-komst-van-de-quantum-computer

10

Bron: https://pqcrypto.eu.org/recommend.html for the most recent

https://www.aivd.nl/actueel/nieuws/2014/11/20/quantumcomputer- recommendations and further specifications.

12

vereist-nieuwe-cryptografische-oplossingen See further https://www.ncsc.gov.uk/information/quantum-key-

11

See distribution

Publication

Nationaal Cyber

Security Centrum (NCSC)

P.O. Box 117, 2501 CC The Hague

Turfmarkt 147, 2511 DP The Hague

+31 (70) 751 5555

More information

www.ncsc.nl

info@ncsc.nl

@ncsc_nl

This information is not legally binding

- Types of CryptographyDiunggah olehBridget Smith
- A New Secure Approach for Message Transmission by Godelization and FCEDiunggah olehijcsis
- btc-guideDiunggah olehbitcointrader_judy
- Network Security and CryptologyDiunggah olehVinayak Sharma
- As 4019.8-1992 Information Technology - Open Systems Interconnection - The Directory Authentication FrameworkDiunggah olehSAI Global - APAC
- Classical Number Theory based Vs Chaos based Cryptography for Wireless Sensor Networks: A Research PerspectiveDiunggah olehInternational Journal for Scientific Research and Development - IJSRD
- 07 Perlner QuantumDiunggah olehHeba Abughali
- Classification of Authentication Protocols: A Practical ApproachDiunggah oleh159zmg
- IRJET-Group Security Model in Wireless Sensor Network using Identity Based Cryptographic SchemeDiunggah olehIRJET Journal
- Secure Checkpointing Approach for Mobile EnvironmentDiunggah olehidescitation
- 6.13.18PresentationDiunggah olehRowan Briggs
- kaliski-crypto-long-term-neu-ccis-2004Diunggah olehDheeraj
- cnsDiunggah oleh11dreamer
- Unit 12 - Digital SignatureDiunggah olehinfo4chaitu
- CSE403 network securityDiunggah olehrajat
- Paper Key EscrowDiunggah olehabcde
- IJETTCS-2014-08-08-91Diunggah olehAnonymous vQrJlEN
- Crypto and Digital SignaturesDiunggah olehPankaj Garg
- Color CryptographyDiunggah olehHimanshu Bhatt
- NETWORK SECURITY & CRYPTOGRAPHYDiunggah olehmycatalysts
- A 021481464Diunggah olehFirliUngu
- Chap 1 NewDiunggah olehoxy9en
- bcicDiunggah olehbromlant
- Final-Ppt-1Diunggah olehDrNagunuri Srinivas
- Security in Wireless Sensor NetworksDiunggah olehLakmal Danushka
- John E. Hopcroft Rajeev Motwani Jeffrey D. Ullman Introduction to Automata Theory Languages and Computations Prentice Hall 2007Diunggah olehashiful islam
- [IJCST-V3I6P9]: Tannu Bala, Yogesh KumarDiunggah olehEighthSenseGroup
- D-28-324-331.pdfDiunggah olehlambanaveen
- MarcoDiunggah olehNaveen Mithare
- Chapter 1 Intro and BackgroundDiunggah oleh2eaa889c

- Introduction to logicDiunggah olehblablablou
- YuMi Come and Play With MeDiunggah olehTamtam Nia
- Drop GangDiunggah olehblablablou
- PolkadotDiunggah olehblablablou
- MakerBot MightyBoard REVE SchematicDiunggah olehbrunoselis
- Reprap Granule Extruder Tudelft1Diunggah olehblablablou
- furbysource.pdfDiunggah olehblablablou
- Xenon WhitepaperDiunggah olehblablablou
- STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONSDiunggah olehblablablou
- Printrbot FirmwareDiunggah olehblablablou
- esp-idf_getting_started_guide_en.pdfDiunggah olehLâm Nhật Quân
- CuckooDiunggah olehblablablou
- Cubex User GuideDiunggah olehblablablou
- Good Random Number GeneratorsDiunggah olehblablablou
- Coding_SPI_sw.pdfDiunggah olehblablablou
- Machine Learning Application LandscapeDiunggah olehblablablou
- matlab-filtrosDiunggah olehblablablou
- pid_on_dspDiunggah olehblablablou
- Cryptography Basics for Embedded Developers - ELC San Diego 2016Diunggah olehblablablou
- Cortex-M for Beginners - 2016 (Final v3)Diunggah olehblablablou
- TkacikDiunggah olehblablablou
- lec07Diunggah olehblablablou
- ArduinoInterrupts.pdfDiunggah olehblablablou
- Kalman FilterDiunggah olehDebi Prosad Dogra
- Programming the Internet of ThingsDiunggah olehKhairul Alam Taifur
- Revolutionize Your Business With Aot.originalDiunggah olehblablablou
- Uputstvo za Eagle02Diunggah olehmitros
- speaker_recognitionDiunggah olehHussain Shareef

- Password Guidance - Simplifying Your ApproachDiunggah olehmahendrasing2
- 1 (1)Diunggah olehAlejandro Corona
- Cloud SecurityDiunggah olehkanchan
- BLOWFISH(Bruce Schneier)Diunggah olehKiran Mayee
- ManetDiunggah olehMurali Daran
- FPGA Implementation of High Speed AES Algorithm for Improving The System Computing SpeedDiunggah olehseventhsensegroup
- pkcs11Diunggah olehNishant Rana
- Stream Cipher Design Using Cellular AutomataDiunggah olehGopi Channagiri
- 4.3.3.DNSSECDiunggah olehsharmasunil6325
- AttacksDiunggah olehTeodora
- 9.Ch_13_Digital Signature and Authentication ProtocolsDiunggah olehIisha Kala
- Ciphersuite Analysis and Strong Cipher Enablement_0Diunggah olehKali Psy
- gehrmann01Diunggah olehj_novin
- NIST.SP.800-133Diunggah olehpooja
- CryptographyDiunggah olehbackswimmer
- HashDiunggah olehTejas Patil
- A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target DefenseDiunggah olehsatya
- Secret Codes Keep Messages PrivateDiunggah olehvampire_459
- IRJET- An Image Cryptography using Henon Map and Arnold Cat MapDiunggah olehIRJET Journal
- 22. Comp Sci - A New Modulo - A. Uma MaheswariDiunggah olehTJPRC Publications
- Password CrackingDiunggah olehJohn Howard
- Introduction to Secure CommunicationDiunggah olehRobert Adkins
- mobile voting systemDiunggah olehsanam
- DSC Request FormDiunggah olehRaju Ranjan Singh
- Information SecurityDiunggah olehShah Raj
- Tutorial Crack Wep EncryptionDiunggah olehSpyDr ByTe
- KaeoDiunggah olehAbrar Ahmad
- review of introductory books.pdfDiunggah olehIoio92
- Retire TeslaCrypt 3.0 Ransomware and Restore .Xxx andDiunggah olehLR Seiya Cordoba
- PKIDiunggah olehMbuji Mayi