:: Volume 4, Issue 4 (5-2021) ::
C4I Journal 2021, 4(4): 21-43 Back to browse issues page
Strategic planning of post quantum cryptography to encounter quantum computing effects on cryptography
Abstract:   (1458 Views)
Quantum computers evolution and the enormous effect of their computation speed is one of the main topics of every scientific gathering today. This massive computation power of theirs will enable them to solve some problems which are unfeasible to solve, even with the use of the strongest classic super computers available today. Cryptographies, which we use for military and non-military applications today, are based on computational hardness of some problems like factorization of a big number or computing discrete log. Post quantum cryptography will be the only solution left to protect our data in the era of converting to quantum world, as they are believed to be resistant to both classical and quantum attacks and also can be exploited without needing quantum infrastructures. By introducing and studying post quantum cryptographies in this work, we tried to propose necessary strategies to employ post quantum cryptographies in I.R.I including armed forces.
For this purpose, after reviewing classical cryptographies, we would introduce post quantum cryptographies and we would present the reasons to exploit post quantum cryptographies. After that we would use SWOT method and elite experts of quantum technologies and information security’s opinion through step-by-step questionnaires, to perform gap analysis and propose strategies to utilize post quantum cryptography in all sectors and forces of Islamic Republic of Iran. Outputs of this research show that I.R.I is on WT sector for post quantum cryptography deployment and proper strategies to encounter the related threats and covering weaknesses of this sector can briefly be stated as: 1) Establishing a national center to specify and approve standard and accepted post quantum cryptographies. 2) Motivating Iranian post quantum experts and elite for collaboration and participation. 3) Fundraising and attracting governmental and private organizations on importance of this field. 4) Providing educational and information sharing infrastructure.
Keywords: Post quantum cryptography, alternative public key schemes, quantum computing, strategy.
Full-Text [PDF 1799 kb]   (1002 Downloads)    
Type of Study: Research | Subject: Industrial Managment
Received: 2020/11/7 | Accepted: 2021/04/9 | Published: 2021/08/19


XML   Persian Abstract   Print



Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 4, Issue 4 (5-2021) Back to browse issues page