首页> 外文会议>Intelligent ships symposium >Post Quantum Cybersecurity
【24h】

Post Quantum Cybersecurity

机译:发布量子网络安全

获取原文

摘要

Cyber security controls in Information Technology (IT) systems and Naval Control Systems (NCS) involve the utilization of cryptographic tools such as encryption, authentication, hashing, digital signatures, and certificate authorities with chains of trust. These tools are the foundation behind higher level concepts such as getting software patches from valid sources and ensuring communications between systems is secure. They are used in everything from online banking and shopping to securing our nation's critical infrastructure. The most common algorithms used are based on two NP-hard math problems: factoring large primes and the elliptic curve discrete logarithm problem. These math problems are computational infeasible to solve using classical computing and today's technologies, however using a quantum computer these problems can be solved in polynomial time. Thus an adversary with access to a sufficiently large enough quantum computer would be capable of significant damage to our nation's critical infrastructure. This paper provides a high level overview of how quantum computers work including information on the Quantum Fourier Transform and its use in solving the period finding problem, which is used in Shor's Algorithm to break cryptosystems. Cryptosystems are then introduced which are immune to attacks via a quantum computer, with the pros and cons discussed. The paper concludes with recommendations on short, mid, and long term changes required to the Navy's afloat and ashore cryptosystem infrastructure. These recommendations take into account current advancements in quantum computing development along with practical limitations in classical and hardware computing power. PLC; HM1; ICS; multicast; authentication; cybersecurity.
机译:信息技术(IT)系统和海军控制系统(NCS)中的网络安全控制涉及利用加密,认证,散列,数字签名和具有信任链的证书机构的密码工具。这些工具是更高级概念的基础,例如从有效源获取软件修补程序,并确保系统之间的通信是安全的。他们被用于网上银行和购物的一切,以确保我们国家的关键基础设施。所使用的最常见的算法基于两个NP-Hard数学问题:对大素质和椭圆曲线离散对数问题进行分解。这些数学问题是使用经典计算和当今技术来解决的计算不可行,但是使用量子计算机可以在多项式时间中解决这些问题。因此,对足够大的量子计算机的访问权力对我们国家的关键基础设施有重大损害的对手。本文提供了Quantum Computers如何工作的高级概述,包括Quantum Finier变换的信息及其在解决Shor算法中用于破坏密码系统的时期发现问题。然后介绍了密码系统,其通过量子计算机免受攻击,具有优缺点。本文结束了对海军漂浮和岸上密码系统基础设施所需的短暂,中期和长期变更的建议。这些建议考虑了量子计算开发的当前进步以及经典和硬件计算能力的实际限制。 PLC; HM1; IC;组播;验证;网络安全。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号