Risk estimation methodology in the post-quantum period
DOI:
https://doi.org/10.30837/rt.2022.2.209.01Keywords:
quantum computer, qubit, methodology, evaluation, risk, post-quantum periodAbstract
The world is in the process of intensive creation and application of quantum technologies. On May 4, 2022, the President of the United States signed the «National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems». Therefore, advancing leadership is an important challenge in quantum computing in general, while reducing risks to vulnerable cryptographic systems. Accordingly, standardized scientific and methodological support for risk assessment should be justified, accepted and applied at the international and national levels when quantum computing is used in general and especially when quantum computing is used in cryptology. The purpose of the work is to substantiate and develop a risk assessment methodology for quantum computing used in cryptology in the so-called “post-quantum period”. With this aim in view the following components were taken into account: the use of methods that have not yet arisen to combat cybersecurity threats; determination of the essence of the quantum risk assessment methodology; identification and documentation of information assets and their current cryptographic protection; research on the state of quantum computers and quantum-safe cryptography. Quantum risk assessment is considered, an ideal approach for identifying and prioritizing threats and vulnerabilities, as well as laying the foundation for the reliable and cost-effective development of systems so that they are resistant to quantum attacks. Quantum risk assessment provides organizations with the knowledge necessary to understand the extent of their quantum cyber risk and the terms in which quantum threats can arise. This will provide the organization with a basis for proactively addressing quantum risks, building a path to a quantum safe state, and implementing and validating quantum safe solutions.
References
National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems. [Електронний ресурс]. Режим доступу: https://www.whitehouse.gov/briefing-room/statements-releases/2022/05/04/national-security-memorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-to-vulnerable-cryptographic-systems/.
Michele Mosca, John Mulholland A Methodology for Quantum Ass Risk Assessment. [Електронний ресурс]. Режим доступу: https://globalriskinstitute.org/publications/3423-2/.
Mosca M., Piani M. (2019). Quantum Threat Timeline. Global Risk Institute. [Електронний ресурс]. Режим доступу: https://globalriskinstitute.org/publications/quantum-threat-timeline/.
Mosca M., Piani M. Quantum Threat Timeline Report 2020. Global Risk Insitute. [Електронний ресурс]. Режим доступу: https://globalriskinstitute.org/publications/quantum-threat-timeline-report-2020/.
Mosca M., Piani M. Quantum Thremtntat Timeline Report 2021. Global Risk Insitute. [Електронний ресурс]. Режим доступу: https://globalriskinstitute.org/publications/2021-quantum-threat-timeline-report/.
Viktor Onoprienko The state of innovative research and development in the field of information security in Ukraine (JSC "IIT") / Viktor Onoprienko, Marina Yesina, Ivan Gorbenko, Yuri Gorbenko, Elena Kachko // Forum: Innovative solutions in a digitalized economy: Germany – Ukraine. [Електронний ресурс]. Режим доступу: https://www.facebook.com/events/596729504987733/.
Gorjan Alagic NISTIR 8309 Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process / Gorjan Alagic, Jacob Alperin-Sheriff, Daniel Apon, David Cooper, Quynh Dang, John Kelsey, Yi-Kai Liu, Carl Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone. Режим доступу: https://doi.org/10.6028/NIST.IR.8309.
Горбенко Ю. І. Побудування та аналіз систем, протоколів та засобів криптографічного захисту ін-формації / Ю. І. Горбенко, за ред. Горбенко І. Д. Харків : Форт, 2016. 959 с.
IBM Quantum breaks the 100-qubit processor barrier. IBM Research Blog. [Електронний ресурс]. Режим доступу: https://research.ibm.com/blog/127-qubit-quantum-processor-eagle.
IBM’s roadmap for scaling quantum technology. IBM Research Blog. [Електронний ресурс]. Режим доступу: https://research.ibm.com/blog/ibm-quantum-roadmap.
First quantum computer to pack 100 qubits enters crowded race. Nature News. Philip Ball [Електронний ресурс]. Режим доступу: https://www.nature.com/articles/d41586-021-03476-5.
IBM claims advance in quantum computing. BBC News. Paul Rincon. [Електронний ресурс]. Режим доступу: https://www.bbc.com/news/science-environment-59320073.
D-Wave plans to build a gate-model quantum computer. TechCrunch. Frederic Lardinois. [Електронний ресурс]. Режим доступу: https://techcrunch.com/2021/10/05/d-wave-plans-to-build-a-gate-model-quantum-computer/.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).