Towards security recommendations for public-key infrastructures for production environments in the post-quantum era
نویسندگان
چکیده
Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss impact of quantum on public key infrastructures (PKIs), which are used as part security systems for protecting production environments. We analyze issues existing models with focus requirements fast transition post-quantum solutions. Although our primary is attacks computing, also some that not directly related cryptographic algorithms but essential overall PKI. attempt provide set recommendations regarding PKI from viewpoints computers.
منابع مشابه
Post-quantum algorithms for digital signing in Public Key Infrastructures
One emerging threat to Public Key Infrastructures is the possible development of largescale quantum computers, which would be able to break the public-key cryptosystems used today. Several possibly post-quantum secure cryptographic algorithms have been proposed but so far they have not been used in many practical settings. The purpose of this thesis was to find post-quantum digital signature al...
متن کاملfaciliting lexical access for the fluent production of speech
the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis,a one-way anova experimental design was carried out. 24 sednior students of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inter...
15 صفحه اولfacilitating lexical access for the fluent production of speech
the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis , a one- way anova experimental design was carried out. 24 senior student of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inte...
15 صفحه اولthe search for the self in becketts theatre: waiting for godot and endgame
this thesis is based upon the works of samuel beckett. one of the greatest writers of contemporary literature. here, i have tried to focus on one of the main themes in becketts works: the search for the real "me" or the real self, which is not only a problem to be solved for beckett man but also for each of us. i have tried to show becketts techniques in approaching this unattainable goal, base...
15 صفحه اولMaintaining security and trust in large scale public key infrastructures
In Public Key Infrastructures (PKIs), trusted Certification Authorities (CAs) issue public key certificates which bind public keys to the identities of their owners. This enables the authentication of public keys which is a basic prerequisite for the use of digital signatures and public key encryption. These in turn are enablers for ebusiness, e-government and many other applications, because t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EPJ Quantum Technology
سال: 2021
ISSN: ['2196-0763', '2662-4400']
DOI: https://doi.org/10.1140/epjqt/s40507-021-00104-z