Risk estimation methodology in the post-quantum period

Authors

DOI:

https://doi.org/10.30837/rt.2022.2.209.01

Keywords:

quantum computer, qubit, methodology, evaluation, risk, post-quantum period

Abstract

The world is in the process of intensive creation and application of quantum technologies. On May 4, 2022, the President of the United States signed the «National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems». Therefore, advancing leadership is an important challenge in quantum computing in general, while reducing risks to vulnerable cryptographic systems. Accordingly, standardized scientific and methodological support for risk assessment should be justified, accepted and applied at the international and national levels when quantum computing is used in general and especially when quantum computing is used in cryptology. The purpose of the work is to substantiate and develop a risk assessment methodology for quantum computing used in cryptology in the so-called “post-quantum period”. With this aim in view the following components were taken into account: the use of methods that have not yet arisen to combat cybersecurity threats; determination of the essence of the quantum risk assessment methodology; identification and documentation of information assets and their current cryptographic protection; research on the state of quantum computers and quantum-safe cryptography. Quantum risk assessment is considered, an ideal approach for identifying and prioritizing threats and vulnerabilities, as well as laying the foundation for the reliable and cost-effective development of systems so that they are resistant to quantum attacks. Quantum risk assessment provides organizations with the knowledge necessary to understand the extent of their quantum cyber risk and the terms in which quantum threats can arise. This will provide the organization with a basis for proactively addressing quantum risks, building a path to a quantum safe state, and implementing and validating quantum safe solutions.

References

National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems. [Електронний ресурс]. Режим доступу: https://www.whitehouse.gov/briefing-room/statements-releases/2022/05/04/national-security-memorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-to-vulnerable-cryptographic-systems/.

Michele Mosca, John Mulholland A Methodology for Quantum Ass Risk Assessment. [Електронний ресурс]. Режим доступу: https://globalriskinstitute.org/publications/3423-2/.

Mosca M., Piani M. (2019). Quantum Threat Timeline. Global Risk Institute. [Електронний ресурс]. Режим доступу: https://globalriskinstitute.org/publications/quantum-threat-timeline/.

Mosca M., Piani M. Quantum Threat Timeline Report 2020. Global Risk Insitute. [Електронний ресурс]. Режим доступу: https://globalriskinstitute.org/publications/quantum-threat-timeline-report-2020/.

Mosca M., Piani M. Quantum Thremtntat Timeline Report 2021. Global Risk Insitute. [Електронний ресурс]. Режим доступу: https://globalriskinstitute.org/publications/2021-quantum-threat-timeline-report/.

Viktor Onoprienko The state of innovative research and development in the field of information security in Ukraine (JSC "IIT") / Viktor Onoprienko, Marina Yesina, Ivan Gorbenko, Yuri Gorbenko, Elena Kachko // Forum: Innovative solutions in a digitalized economy: Germany – Ukraine. [Електронний ресурс]. Режим доступу: https://www.facebook.com/events/596729504987733/.

Gorjan Alagic NISTIR 8309 Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process / Gorjan Alagic, Jacob Alperin-Sheriff, Daniel Apon, David Cooper, Quynh Dang, John Kelsey, Yi-Kai Liu, Carl Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone. Режим доступу: https://doi.org/10.6028/NIST.IR.8309.

Горбенко Ю. І. Побудування та аналіз систем, протоколів та засобів криптографічного захисту ін-формації / Ю. І. Горбенко, за ред. Горбенко І. Д. Харків : Форт, 2016. 959 с.

IBM Quantum breaks the 100-qubit processor barrier. IBM Research Blog. [Електронний ресурс]. Режим доступу: https://research.ibm.com/blog/127-qubit-quantum-processor-eagle.

IBM’s roadmap for scaling quantum technology. IBM Research Blog. [Електронний ресурс]. Режим доступу: https://research.ibm.com/blog/ibm-quantum-roadmap.

First quantum computer to pack 100 qubits enters crowded race. Nature News. Philip Ball [Електронний ресурс]. Режим доступу: https://www.nature.com/articles/d41586-021-03476-5.

IBM claims advance in quantum computing. BBC News. Paul Rincon. [Електронний ресурс]. Режим доступу: https://www.bbc.com/news/science-environment-59320073.

D-Wave plans to build a gate-model quantum computer. TechCrunch. Frederic Lardinois. [Електронний ресурс]. Режим доступу: https://techcrunch.com/2021/10/05/d-wave-plans-to-build-a-gate-model-quantum-computer/.

Published

2022-06-24

How to Cite

Yesina, M. ., Potii, O. ., Gorbenko, Y. ., & Ponomar, V. . (2022). Risk estimation methodology in the post-quantum period. Radiotekhnika, 2(209), 7–15. https://doi.org/10.30837/rt.2022.2.209.01

Issue

Section

Articles

Most read articles by the same author(s)

1 2 3 4 > >>