The Future of Cybersecurity: The Quantum Challenge
Full text | |||
Source | Journal of Information Systems Security Volume 20, Number 3 (2024)
Pages 167–183
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | Mário Caldeira — ISEG – Lisbon School of Economics and Mangemement, ULisboa and Deloitte Technology, Portugal
João Sabino — Deloitte Technology, Portugal
|
||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
Quantum technologies have garnered significant attention over the past two decades. Advances in quantum research have resulted in a wide range of applications, expanding the scope of quantum mechanics to several domains: sensing, computing and communications. In particular, quantum-enhanced cybersecurity emerged as a relevant topic, both in terms of threats and solutions.
Cybersecurity is becoming increasingly important for society, in general, and organizations in particular. A fundamental pillar of cybersecurity is cryptography, which is used to encode and protect data. However, the cryptographic techniques that are used nowadays rely on the assumption that is impossible to factor large bit numbers in a meaningful period of time. More recently, this context has changed. Future quantum processors are likely to solve extremely challenging computational problems and break public-key cryptography by using brute-force attacks.
This paper presents a comprehensive overview of the “state of the art” of quantum technologies, explaining why and how they will affect cybersecurity. In order to protect critical information from more powerful and advanced hacking power, enabled by future quantum computers, organizations need to redefine their security procedures and implement new and emerging techniques and technologies, such as post-quantum cryptography (PQC) or quantum key distribution (QKD). They also need to establish organizational processes and develop competences to deal with this upcoming context.
Keywords
Quantum Technologies, Information Security, Quantum Key Distribution, Post-quantum Cryptography.
References
Barrett, J., Colbeck, R. and Kent, A. (2012). "Unconditionally secure device-independent quantum key distribution with only two devices". Physical Review A, 86(622326).
Bennett, C. and Brassard, G. (1984). Quantum cryptography: public key distribution and coin tossing. Bangalore, India.
Bernstein, D., Buchmann, J. and Dahmen, E. (2009). Post-Quantum Cryptography, Springer.
Bernstein, D. J. and Lange, T. (2017). "Post-quantum cryptography", Nature, 549, pp. 188-194.
Bova, F., Goldfarb, A. and Melko, R. (2023). “Quantum Economic Advantage”, Management Science, 69(2).
Coppersmith, D. (1994). An Approximate Fourier Transform Useful in Quantum Factoring. IBM Research Report, IBM, Almaden.
Couteau, C. (2018). "Spontaneous Parametric Down Conversion", Contemporary Physics, 59(3), pp. 291-304.
Csenkey, K. and Bindel, N. (2023). "Post-quantum cryptographic assemblages and the governance of the quantum threat". Journal of Cybersecurit, 9(1), pp. 1-14.
Dargan, J. (2021). 25 Quantum Cryptography & Encryption Companies [2022]. [Online] Available at: https://thequantuminsider.com/2021/01/11/25-companies-building-the-quantum-cryptography-communications-markets/
Diffie, W. and Hellman, M., 1976. "New directions in cryptography". IEEE Transactions on Information Theory, 22(6).
Diamanti, E. (2015). "Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations". Entropy, 17(9), pp. 6072-6092.
Dhillon, G.; Smith, K. and Dissanayaka, I. (2021). "Information systems security research agenda: Exploring the gap between research and practice", Journal of Strategic Information Systems, 30, 1-17.
Gisin, N., Ribordy, G., Tittel, W. and Zbinden, H. (2002). "Quantum Cryptography". Reviews of Modern Physics, 74(145).
Gisin, N. and Thew, R. (2007). "Quantum Communication". Nature Photonics, 1, pp. 165-171.
Goel, S. and Shawky, H. (2009). “Estimating the market impact of security breach announcements on firm values”, Information & Management 46(7), 404-410.
Grover, L. K. (1996). "A Fast Quantum Mechanical Algorithm for Database Search". Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, 22-24 May 212-219.
Heshami, K. et al. (2016). "Quantum memories: emerging applications and recent advances", Journal of Modern Optics, 63(20).
Hovav, A., Gnizy, I. and Jinyoung, H. (2023). “The effects of cyber regulations and security policies on organizational outcomes: a knowledge management perspective”, European Journal of Information Systems, 32(2), 154-172.
Jin, R.-B. et al. (2015). "Highly efficient entanglement swapping and teleportation at telecom wavelength", Scientific Reports, 5(1).
Joseph, D. et al. (2022). "Transitioning organizations to post-quantum cryptography", Nature, 605, pp. 237-243.
Kwiat, P. G. and Weinfurter, H. (1998). "Embedded Bell-state analysis", Physical Review A, 58, p. 2623–2626.
Liao, S.-K. et al. (2018). "Satellite-Relayed Intercontinental Quantum Network", Physical Review Letters, 120(3).
Ma, X. et al. (2016). "Quantum random number generation", npj Quantum Information, 2(16021).
Montanaro, A. (2016). "Quantum algorithms: an overview", npj Quantum Information, 2(15023).
Nielsen, M. A. and Chuang, I. L. (2000). Quantum Computation and Quantum Information. s.l.:Cambridge University Press.
NIST (2016). Announcing Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms. Available on-line: https://csrc.nist.gov/news/2016/public-key-post-quantum-cryptographic-algorithms
NIST (2018). Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. U.S. Department of Commerce. Available from https://doi.org/10.6028/NIST.SP.800-37r2
NIST (2023). Post-quantum cryptography. Available on-line: https://csrc.nist.gov/Projects/post-quantum-cryptography/workshops-and-timeline.
Parthasarathy, S. et al. (2023). “Scalable Quantum Memory Nodes Using Nuclear Spins in Silicon Carbide”, Physical Review Applied 19(3).
Pathak, N., Chaudhary, S., Kanseri, S. and Kanseri, B. (2023). “Phase encoded quantum key distribution up to 380 km in standard telecom grade fiber enabled by baseline error optimization”. nature scientific reports 13, 15868. https://doi.org/10.1038/s41598-023-42445-y.
Pirandola, S. et al. (2020). "Advances in quantum cryptography". Advances in Optics and Photonics, 12(4).
Preskill, J. (2023). Quantum computing 40 years later. arXiv:2106.10522v3.
Rabie, O. (2023). "Cyber terrorism: a critical assessment of the threat landscape and countermeasures", Journal of Information Systems Security, 18(3), pp. 155-165.
Rivest, R. L., Shamir, A. and Adleman, L. (1978). "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, 21(2), pp. 120-126.
Ruane, J., McAfee, A. and Oliver, W. (2022).”Quantum Computing for Business Leaders”, Harvard Business Review, Jan.-Feb.
SandboxAQ (2022). Agile Cryptography for the Banking Industry, access online: www.sandboxaq.com.
Shor, P. (1999). “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer”, SIAM Rev.
Sorensen, B. (2022). Quantum Computing early adopters: strong prospects for future QC use case impact, Hyperion Research.
Stanley, M. et al. (2022). "Recent Progress in Quantum Key Distribution Network Developments and Standards", Journal of Physics Conference Series, 2416.
Svensson, B. (2013). "Pedagogical Review of Quantum Measurement Theory with an Emphasis on Weak Measurements", Quanta, 2(1), pp. 18-49.
Swayne, M. (2022). Quantum Technology Investment Update, s.l.: The Quantum Insider.
Wehner, S., Elkouss, D. and Hanson, R. (2013). "Quantum internet: A vision for the road ahead", Science, 362(303).
World Economic Forum (2023). Quantum Readiness Toolkit: Building a Quantum-Secure Economy, White Paper, in collaboration with Deloitte.