|
Work Item Reference |
ETSI Doc. Number |
STF |
Technical Body in Charge |
Download Standard
|
|
DEG/CYBER-0008
|
EG 203 310
|
|
CYBER
|
|
Current Status (Click to View Full Schedule) |
Latest Version
|
Cover Date |
Standstill |
Creation Date |
|
Publication (2016-06-20)
|
1.1.1
|
2016-06-20
|
View Standstill Information
|
2014-10-10
|
|
Rapporteur |
Technical Officer |
Harmonised Standard |
|
|
Scott Cadzow
|
Sonia Compans
|
No
|
|
|
Title
|
CYBER; Quantum Computing Impact on security of ICT Systems; Recommendations on Business Continuity and Algorithm Selection Post Quantum Computing impact on ICT
|
Scope and Field of Application
|
The intent of the work item is to address business continuity arising from the concern that quantum computing is likely to invalidate the problems that lie at the heart of both RSA and ECC asymmetric cryptography. The current assumptions that underpin the security strength of RSA and ECC are that the solution to the prime factoring, and the discrete logarithm problems are infeasible without prior knowledge. It has been widely suggested that the application of quantum computing to these problems removes the assertion of infeasibility. Whilst it is not known when quantum computing will arrive or how long it will be until the factorisation and discrete logarithm problems are themselves solved the report will review the nature of the algorithms when subjected to QC attack and why they become vulnerable. In addition the report will highlight the characteristics required of algorithms in order to be invulnerable under QC attack. The report will consider a number of sub topics to be covered in considering the transition to the post-quantum era and they are not all algorithmic but many of the necessary considerations apply to business continuity. For example how to re-assert CAs in a PKI? How to distribute new algorithms? How to distribute new keys?
|
Supporting Organizations
|
The Police of the Netherlands, Cadzow Communications, CESG, Yaana Limited
|