Strategic planning of post quantum cryptography to encounter quantum computing effects on cryptography

Message:
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:

Quantum computers evolution and the enormous effect of their computation speed is one of the main topics of every scientific gathering today. This massive computation power of theirs will enable them to solve some problems which are unfeasible to solve, even with the use of the strongest classic super computers available today. Cryptographies, which we use for military and non-military applications today, are based on computational hardness of some problems like factorization of a big number or computing discrete log. Post quantum cryptography will be the only solution left to protect our data in the era of converting to quantum world, as they are believed to be resistant to both classical and quantum attacks and also can be exploited without needing quantum infrastructures. By introducing and studying post quantum cryptographies in this work, we tried to propose necessary strategies to employ post quantum cryptographies in I.R.I including armed forces.
For this purpose, after reviewing classical cryptographies, we would introduce post quantum cryptographies and we would present the reasons to exploit post quantum cryptographies. After that we would use SWOT method and elite experts of quantum technologies and information security’s opinion through step-by-step questionnaires, to perform gap analysis and propose strategies to utilize post quantum cryptography in all sectors and forces of Islamic Republic of Iran. Outputs of this research show that I.R.I is on WT sector for post quantum cryptography deployment and proper strategies to encounter the related threats and covering weaknesses of this sector can briefly be stated as: 1) Establishing a national center to specify and approve standard and accepted post quantum cryptographies. 2) Motivating Iranian post quantum experts and elite for collaboration and participation. 3) Fundraising and attracting governmental and private organizations on importance of this field. 4) Providing educational and information sharing infrastructure.

Language:
Persian
Published:
Journal of Command and Control Communications Computer Intelligence, Volume:4 Issue: 4, 2021
Pages:
21 to 43
magiran.com/p2327692  
دانلود و مطالعه متن این مقاله با یکی از روشهای زیر امکان پذیر است:
اشتراک شخصی
با عضویت و پرداخت آنلاین حق اشتراک یک‌ساله به مبلغ 1,390,000ريال می‌توانید 70 عنوان مطلب دانلود کنید!
اشتراک سازمانی
به کتابخانه دانشگاه یا محل کار خود پیشنهاد کنید تا اشتراک سازمانی این پایگاه را برای دسترسی نامحدود همه کاربران به متن مطالب تهیه نمایند!
توجه!
  • حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران می‌شود.
  • پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانه‌های چاپی و دیجیتال را به کاربر نمی‌دهد.
In order to view content subscription is required

Personal subscription
Subscribe magiran.com for 70 € euros via PayPal and download 70 articles during a year.
Organization subscription
Please contact us to subscribe your university or library for unlimited access!