Migrating Software Systems Toward Post-Quantum Cryptography-A Systematic Literature Review

被引:0
|
作者
Naether, Christian [1 ]
Herzinger, Daniel [2 ]
Gazdag, Stefan-Lukas [2 ]
Steghoefer, Jan-Philipp [1 ]
Daum, Simon [2 ]
Loebenberger, Daniel [3 ]
机构
[1] XITASO Gmbh, D-86153 Augsburg, Germany
[2] genua GmbH, D-85551 Kirchheim, Germany
[3] Fraunhofer AISEC, D-85748 Garching, Germany
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Data mining; Cryptography; Planning; Surveys; Software systems; Quantum computing; Protocols; Migration; post-quantum cryptography; quantum-safe; transition;
D O I
10.1109/ACCESS.2024.3450306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Networks such as the Internet are essential for our connected world. Quantum computing threatens its fundamental security mechanisms. Therefore, a migration to post-quantum-cryptography (PQC) is necessary for networks and their components. Currently, there is little knowledge on how such migrations should be structured and implemented in practice. Our systematic literature review addresses migration approaches for IP networks towards PQC. It surveys papers about the migration process and exemplary real-world software system migrations. On the process side, we found that terminology, migration steps, and roles are not defined precisely or consistently across the literature. Still, we identified four major phases and appropriate substeps which we matched with also emerging archetypes of roles. In terms of real-world migrations, we see that reports used several different PQC implementations and hybrid solutions for migrations of systems belonging to a wide range of system types. Across all papers we noticed three major challenges for adopters: missing experience of PQC and a high realization effort, concerns about the security of the upcoming system, and finally, high complexity. Our findings indicate that recent standardization efforts already push quantum-safe networking forward. However, the literature is still not in consensus about definitions and best practices. Implementations are mostly experimental and not necessarily practical, leading to an overall chaotic situation. To better grasp this fast moving field of (applied) research, our systematic literature review provides a comprehensive overview of its current state and serves as a starting point for delving into the matter of PQC migration.
引用
收藏
页码:132107 / 132126
页数:20
相关论文
共 50 条
  • [1] Hardware Circuits and Systems Design for Post-Quantum Cryptography-A Tutorial Brief
    Xie, Jiafeng
    Zhao, Wenfeng
    Lee, Hanho
    Roy, Debapriya Basu
    Zhang, Xinmiao
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (03) : 1670 - 1676
  • [2] Post-Quantum Cryptography in Embedded Systems
    Marzougui, Soundes
    Kraemer, Juliane
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [3] Post-quantum cryptography for automotive systems
    Fritzmann T.
    Vith J.
    Flórez D.
    Sepúlveda J.
    [J]. Microprocessors and Microsystems, 2021, 87
  • [4] Post-Quantum Cryptography for Embedded Systems
    Koziel, Brian
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    [J]. 2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [5] Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement
    Giron, Alexandre Augusto
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 857 - 862
  • [6] Post-Quantum Cryptography
    Monroe, Don
    [J]. COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [7] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    [J]. Nature, 2017, 549 : 188 - 194
  • [8] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    [J]. NATURE, 2017, 549 (7671) : 188 - 194
  • [9] Developing Secure Messaging Software using Post-Quantum Cryptography
    Nguyen, Tat-Thang
    Luc, Nhu-Quynh
    Dao, Toan Thanh
    [J]. ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2023, 13 (06) : 12440 - 12445
  • [10] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +