POST-QUANTUM THREATS TO INFORMATION SECURITY: CHALLENGES AT THE GLOBAL AND NATIONAL LEVELS
Abstract
The article examines the key aspects of the impact of quantum computing on modern information security, as well as the potential consequences of its implementation in various spheres of public life. In particular, it analyzes the risks arising from the possibility of breaking traditional cryptographic algorithms, such as RSA, DSA, ECC, and others, using quantum computers capable of performing computations at unprecedented speeds. This poses a threat to the confidentiality, integrity, and availability of information in financial, governmental, military, and other critically important systems. The study proposes solutions to address issues related to the implementation of quantum-resistant cryptography. It out-lines the prospects of using algorithms based on lattices, error-correcting codes, multivariate equations, isogenies of elliptic curves, and other approaches capable of ensuring long-term data security. International initiatives for the standardization of post-quantum cryptographic technologies are considered, with particular emphasis on the NIST program for the development of new cryptographic standards.Special attention is paid to the challenges faced by countries at the national level. These include the need to modernize existing information systems, develop new cybersecurity standards, train specialists in quantum technologies, and address significant financial and organizational costs. Risks are highlighted for financial, energy, transportation, and governmental infrastructures that are critically dependent on reliable cryptographic protection methods. The article emphasizes the importance of international cooperation in addressing global post-quantum threats. Mechanisms for international exchange of experience, joint research, and the formation of alliances to accelerate the implementation of quantum-resistant technologies are proposed. The necessity of developing new cybersecurity strategies that account for future challenges and ensure the stability of modern information systems in the post-quantum era is explored.
References
2. Беннетт С. Г., Брассар Г. Quantum Cryptography: Public Key Distribution and Coin Tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. 1984. С. 175–179. URL: https:// ieeexplore.ieee.org
3. Чайлдс А. М., ван Дам В. Quantum Algorithms for Algebraic Problems. Reviews of Modern Physics. 2010. Т. 82, № 1. С. 1–52. URL: https://journals.aps.org
4. Гровер Л. К. A Fast Quantum Mechanical Algorithm for Database Search. Proceedings of the 28th Annual ACM Symposium on Theory of Computing. 1996. С. 212–219. URL: https://dl.acm.org
5. Національний інститут стандартів і технологій (NIST). Post-Quantum Cryptography Standardization: Round 3 Submissions. 2022. URL: https://csrc.nist.gov/publications
6. Прескілл Д. Quantum Computing in the NISQ Era and Beyond. Quantum. 2018. Т. 2, № 79. С. 79. DOI: 10.22331/q-2018-08-06-79. URL: https://quantum-journal.org
7. Ріффель Е. Г., Полак В. Х. Quantum Computing: A Gentle Introduction. Cambridge: MIT Press, 2011. URL: https://mitpress.mit.edu
8. Шор П. В. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing. 1997. Т. 26, № 5. С. 1484–1509. DOI: 10.1137/S0097539795293172. URL: https://epubs.siam.org
9. Сміт Дж. Quantum Computing: Global Implications. Oxford: Academic Press, 2022. URL: https://www.elsevier.com
10. Нільсен М. А., Чуанг І. Л. Quantum Computation and Quantum Information. Cambridge: Cambridge University Press, 2010. DOI: 10.1017/CBO9780511976667. URL: https://www.cambridge.org
11. Ладд Т. Д., Єлезко Ф., Лафламм Р., Накамура Ю., Монро С., О’Брайен Дж. Л. Quantum Computers. Nature. 2010. Т. 464, № 7285. С. 45–53. DOI: 10.1038/nature08812. URL: https://www.nature.com
12. Екерт А. К. Quantum Cryptography Based on Bell’s Theorem. Physical Review Letters. 1991. Т. 67, № 6. С. 661–663. DOI: 10.1103/PhysRevLett.67.661. URL: https://journals.aps.org
13. Монтанаро А. Quantum Algorithms: An Overview. npj Quantum Information. 2016. Т. 2. С. 15023. DOI: 10.1038/npjqi.2015.23. URL: https://www.nature.com
14. Ван Метер Р. Quantum Networking. Hoboken: Wiley, 2014. URL: https://www.wiley.com