[Home ] [Archive]   [ فارسی ]  
:: Main :: Archive :: About :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Volume 4, Issue 4 (5-2021) ::
C4I Journal 2021, 4(4): 21-43 Back to browse issues page
Strategic planning of post quantum cryptography to encounter quantum computing effects on cryptography
Abstract:   (1422 Views)
Quantum computers evolution and the enormous effect of their computation speed is one of the main topics of every scientific gathering today. This massive computation power of theirs will enable them to solve some problems which are unfeasible to solve, even with the use of the strongest classic super computers available today. Cryptographies, which we use for military and non-military applications today, are based on computational hardness of some problems like factorization of a big number or computing discrete log. Post quantum cryptography will be the only solution left to protect our data in the era of converting to quantum world, as they are believed to be resistant to both classical and quantum attacks and also can be exploited without needing quantum infrastructures. By introducing and studying post quantum cryptographies in this work, we tried to propose necessary strategies to employ post quantum cryptographies in I.R.I including armed forces.
For this purpose, after reviewing classical cryptographies, we would introduce post quantum cryptographies and we would present the reasons to exploit post quantum cryptographies. After that we would use SWOT method and elite experts of quantum technologies and information security’s opinion through step-by-step questionnaires, to perform gap analysis and propose strategies to utilize post quantum cryptography in all sectors and forces of Islamic Republic of Iran. Outputs of this research show that I.R.I is on WT sector for post quantum cryptography deployment and proper strategies to encounter the related threats and covering weaknesses of this sector can briefly be stated as: 1) Establishing a national center to specify and approve standard and accepted post quantum cryptographies. 2) Motivating Iranian post quantum experts and elite for collaboration and participation. 3) Fundraising and attracting governmental and private organizations on importance of this field. 4) Providing educational and information sharing infrastructure.
Keywords: Post quantum cryptography, alternative public key schemes, quantum computing, strategy.
Full-Text [PDF 1799 kb]   (977 Downloads)    
Type of Study: Research | Subject: Industrial Managment
Received: 2020/11/7 | Accepted: 2021/04/9 | Published: 2021/08/19
Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Strategic planning of post quantum cryptography to encounter quantum computing effects on cryptography. C4I Journal 2021; 4 (4) :21-43
URL: http://ic4i-journal.ir/article-1-235-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 4, Issue 4 (5-2021) Back to browse issues page
فصلنامه علمی-پژوهشی فرماندهی و کنترل C4I Journal

 
Persian site map - English site map - Created in 0.05 seconds with 37 queries by YEKTAWEB 4645