Migrating Software Systems Toward Post-Quantum Cryptography-A Systematic Literature Review

被引:0
|
作者
Naether, Christian [1 ]
Herzinger, Daniel [2 ]
Gazdag, Stefan-Lukas [2 ]
Steghoefer, Jan-Philipp [1 ]
Daum, Simon [2 ]
Loebenberger, Daniel [3 ]
机构
[1] XITASO Gmbh, D-86153 Augsburg, Germany
[2] genua GmbH, D-85551 Kirchheim, Germany
[3] Fraunhofer AISEC, D-85748 Garching, Germany
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Data mining; Cryptography; Planning; Surveys; Software systems; Quantum computing; Protocols; Migration; post-quantum cryptography; quantum-safe; transition;
D O I
10.1109/ACCESS.2024.3450306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Networks such as the Internet are essential for our connected world. Quantum computing threatens its fundamental security mechanisms. Therefore, a migration to post-quantum-cryptography (PQC) is necessary for networks and their components. Currently, there is little knowledge on how such migrations should be structured and implemented in practice. Our systematic literature review addresses migration approaches for IP networks towards PQC. It surveys papers about the migration process and exemplary real-world software system migrations. On the process side, we found that terminology, migration steps, and roles are not defined precisely or consistently across the literature. Still, we identified four major phases and appropriate substeps which we matched with also emerging archetypes of roles. In terms of real-world migrations, we see that reports used several different PQC implementations and hybrid solutions for migrations of systems belonging to a wide range of system types. Across all papers we noticed three major challenges for adopters: missing experience of PQC and a high realization effort, concerns about the security of the upcoming system, and finally, high complexity. Our findings indicate that recent standardization efforts already push quantum-safe networking forward. However, the literature is still not in consensus about definitions and best practices. Implementations are mostly experimental and not necessarily practical, leading to an overall chaotic situation. To better grasp this fast moving field of (applied) research, our systematic literature review provides a comprehensive overview of its current state and serves as a starting point for delving into the matter of PQC migration.
引用
下载
收藏
页码:132107 / 132126
页数:20
相关论文
共 50 条
  • [21] Post-Quantum Cryptography in MPSoC Environments
    Sepulveda, Johanna
    Winkler, Dominik
    Sepulveda, Daniel
    Cupelli, Mario
    Olexa, Radek
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 224 - 229
  • [22] Transitioning organizations to post-quantum cryptography
    David Joseph
    Rafael Misoczki
    Marc Manzano
    Joe Tricot
    Fernando Dominguez Pinuaga
    Olivier Lacombe
    Stefan Leichenauer
    Jack Hidary
    Phil Venables
    Royal Hansen
    Nature, 2022, 605 : 237 - 243
  • [23] Research Trends in Post-quantum Cryptography
    Xagawa, Keita
    NTT Tech. Rev., 2019, 3 (22-26): : 22 - 26
  • [24] Recent Developments in Post-Quantum Cryptography
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 3 - 11
  • [25] Transitioning organizations to post-quantum cryptography
    Joseph, David
    Misoczki, Rafael
    Manzano, Marc
    Tricot, Joe
    Pinuaga, Fernando Dominguez
    Lacombe, Olivier
    Leichenauer, Stefan
    Hidary, Jack
    Venables, Phil
    Hansen, Royal
    NATURE, 2022, 605 (7909) : 237 - 243
  • [26] Post-quantum cryptography: lattice signatures
    Johannes Buchmann
    Richard Lindner
    Markus Rückert
    Michael Schneider
    Computing, 2009, 85 : 105 - 125
  • [27] Post-quantum cryptography: lattice signatures
    Buchmann, Johannes
    Lindner, Richard
    Rueckert, Markus
    Schneider, Michael
    COMPUTING, 2009, 85 (1-2) : 105 - 125
  • [28] FPGA Accelerated Post-Quantum Cryptography
    Li, He
    Tang, Yongming
    Que, Zhiqiang
    Zhang, Jiliang
    IEEE TRANSACTIONS ON NANOTECHNOLOGY, 2022, 21 : 685 - 691
  • [29] Post-Quantum Cryptography in WireGuard VPN
    Kniep, Quentin M.
    Mueller, Wolf
    Redlich, Jens-Peter
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 261 - 267
  • [30] Implementing Post-quantum Cryptography for Developers
    Hekkala, Julius
    Halunen, Kimmo
    Vallivaara, Visa
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 73 - 83