Preparing for the Information Security Threat from Quantum Computers

被引:4
|
作者
Mashatan, Atefeh [1 ]
Turetken, Ozgur [2 ]
机构
[1] Ryerson Univ, Cybersecur Res Lab, Toronto, ON, Canada
[2] Ryerson Univ, Ted Rogers Sch Management, Res, Toronto, ON, Canada
关键词
D O I
10.17705/2msqe.00030
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
A major threat posed by quantum computers is that they will be able to crack current standardized cryptography. A scalable quantum computer is still challenging to build from an engineering perspective, but there is an imminent threat to digital security and privacy where encrypted information, such as personally identifiable information, will remain valuable for a long time. The insights from our research provide guidelines on how IT departments and/or security solution providers can prepare to transform their currently quantum-vulnerable systems to quantum-resistant alternatives.(1,2)
引用
收藏
页码:157 / 164
页数:8
相关论文
共 50 条
  • [31] Numerical simulation of information recovery in quantum computers
    Salas, PJ
    Sanz, AL
    [J]. PHYSICAL REVIEW A, 2002, 66 (02) : 11
  • [32] Survey on Quantum Information Security
    Huanguo Zhang
    Zhaoxu Ji
    Houzhen Wang
    Wanqing Wu
    [J]. China Communications, 2019, 16 (10) : 1 - 36
  • [33] Quantum information security technology
    Zhao, Sheng-Mei
    Yao, Jia
    Li, Fei
    Zheng, Bao-Yu
    [J]. Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2005, 25 (03): : 1 - 7
  • [34] Numerical simulation of information recovery in quantum computers
    Salas, P.J.
    Sanz, A.L.
    [J]. Physical Review A - Atomic, Molecular, and Optical Physics, 2002, 66 (02): : 1 - 022302
  • [35] Temporal Information Processing on Noisy Quantum Computers
    Chen, Jiayin
    Nurdin, Hendra I.
    Yamamoto, Naoki
    [J]. PHYSICAL REVIEW APPLIED, 2020, 14 (02)
  • [36] The Value of data sets in Information and Knowledge Management as a Threat to Information Security
    Zywiolek, Justyna
    Schiavone, Francesco
    [J]. PROCEEDINGS OF THE 22ND EUROPEAN CONFERENCE ON KNOWLEDGE MANAGEMENT (ECKM 2021), 2021, : 882 - 891
  • [37] CYBER TERRORISM - A MODERN SECURITY THREAT TO INFORMATION SYSTEMS
    Prislan, Kaja
    Bernik, Igor
    [J]. POLICING IN CENTRAL AND EASTERN EUROPE - SOCIAL CONTROL OF UNCONVENTIONAL DEVIANCE: CONFERENCE PROCEEDINGS, 2011, : 175 - +
  • [38] A Threat Table Based Assessment of Information Security in Telemedicine
    Pendergrass, John C.
    Heart, Karen
    Ranganathan, C.
    Venkatakrishnan, V. N.
    [J]. INTERNATIONAL JOURNAL OF HEALTHCARE INFORMATION SYSTEMS AND INFORMATICS, 2014, 9 (04) : 20 - 31
  • [39] Secure and Robust Cyber Security Threat Information Sharing
    Bkakria, Anis
    Yaich, Reda
    Arabi, Walid
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 3 - 18
  • [40] Security Automation and Threat Information-Sharing Options
    Kampanakis, Panos
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (05) : 42 - 51