Cyber IT Supervisory Forum eBook

Internal Use Only

Quantum Computing and Post-Quantum Crypto*  This is a complex topic. Need to understand:

 Risks posed by quantum computers  Time frames associated with the risks and the response actions  Complexity of the ecosystem associated with the topic

*Note: Much of this material is taken from [18] Moses Liskov, Post-Quantum Crypto and the Post-Quantum Migration “101 ,” October 9, 2024, MITRE Corporation Case number PR_23-04232-5.

21

© 2024 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-01698-01.

Internal Use Only

Primer: What is Asymmetric Cryptography?

 Asymmetric cryptography involves two different keys  Public Key for one operation (e.g. encryption)  Private Key for the other (e.g. decryption)

 These keys will be logically linked, by a mathematical hard problem  Factoring large numbers

 Discrete logarithm  Learning with errors  Lattice shortest vector problem

easy

hard

22

© 2024 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-01698-01.

Made with FlippingBook Digital Publishing Software