Cyber IT Supervisory Forum eBook
Internal Use Only
Quantum Computing and Post-Quantum Crypto* This is a complex topic. Need to understand:
Risks posed by quantum computers Time frames associated with the risks and the response actions Complexity of the ecosystem associated with the topic
*Note: Much of this material is taken from [18] Moses Liskov, Post-Quantum Crypto and the Post-Quantum Migration “101 ,” October 9, 2024, MITRE Corporation Case number PR_23-04232-5.
21
© 2024 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-01698-01.
Internal Use Only
Primer: What is Asymmetric Cryptography?
Asymmetric cryptography involves two different keys Public Key for one operation (e.g. encryption) Private Key for the other (e.g. decryption)
These keys will be logically linked, by a mathematical hard problem Factoring large numbers
Discrete logarithm Learning with errors Lattice shortest vector problem
easy
hard
22
© 2024 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-01698-01.
Made with FlippingBook Digital Publishing Software