Searched for: subject%3A%22Transition%22
(1 - 4 of 4)
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
By utilizing the properties of quantum mechanics, quantum computers have the potential to factor a key pair of a large prime number and break some of the core cryptographic primitives that most information infrastructures depend on. This means that today's widely used cryptographic algorithms can soon become unsafe and need to be modified...
journal article 2024
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
The quantum computing-based threats call for a critical information infrastructure to modify widely used cryptographic algorithms to ones that are quantum-safe (QS). Yet, little scholarly research has been undertaken to study QS transition, and the guidance to prepare for socio-technical predicaments of the transition falls short. To address the...
journal article 2023
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
The computation power of quantum computers introduces new security threats in Public Key Infrastructure (PKI), a system used by many governments to secure their digital public services and communication. This calls for an inevitable need for governments to be quantum-safe (QS) by modifying their PKI systems to be resistant to the attacks of...
conference paper 2022
document
Kong, I. (author)
Public Key Infrastructures (PKIs) provide digital public services and communication by securing information-sharing and strong credentials for digital identity management to individuals, businesses, and government agencies. While cryptographic algorithms that current PKI systems depend on are mostly resilient against hacks and other threats...
conference paper 2022
Searched for: subject%3A%22Transition%22
(1 - 4 of 4)