Migrating Software Systems towards Post-Quantum-Cryptography -- A Systematic Literature Review

Christian Näther,Daniel Herzinger,Stefan-Lukas Gazdag,Jan-Philipp Steghöfer,Simon Daum,Daniel Loebenberger
2024-06-24
Abstract:Networks such as the Internet are essential for our connected world. Quantum computing poses a threat to this heterogeneous infrastructure since it threatens fundamental security mechanisms. Therefore, a migration to post-quantum-cryptography (PQC) is necessary for networks and their components. At the moment, there is little knowledge on how such migrations should be structured and implemented in practice. Our systematic literature review addresses migration approaches for IP networks towards PQC. It surveys papers about the migration process and exemplary real-world software system migrations. On the process side, we found that terminology, migration steps, and roles are not defined precisely or consistently across the literature. Still, we identified four major phases and appropriate substeps which we matched with also emerging archetypes of roles. In terms of real-world migrations, we see that reports used several different PQC implementations and hybrid solutions for migrations of systems belonging to a wide range of system types. Across all papers we noticed three major challenges for adopters: missing experience of PQC and a high realization effort, concerns about the security of the upcoming system, and finally, high complexity. Our findings indicate that recent standardization efforts already push quantum-safe networking forward. However, the literature is still not in consensus about definitions and best practices. Implementations are mostly experimental and not necessarily practical, leading to an overall chaotic situation. To better grasp this fast moving field of (applied) research, our systematic literature review provides a comprehensive overview of its current state and serves as a starting point for delving into the matter of PQC migration.
Cryptography and Security
What problem does this paper attempt to address?
The problems that this paper attempts to solve are: How to migrate existing software systems to Post - Quantum Cryptography (PQC) in the current complex network ecosystem to deal with the threats of future quantum computing to existing encryption mechanisms. Specifically, the paper aims to solve the following key issues: 1. **Migration steps and processes**: - Currently, there is a lack of consistency and precision in the methods, steps, and terms regarding PQC migration. The paper identifies and classifies the basic stages and their sub - steps of PQC migration through Systematic Literature Review (SLR). - Determine the roles undertaking different tasks in the PQC migration process to provide clear responsibility assignments for practical operations. 2. **Technical applications**: - Understand the application situation of PQC in actual software systems, including which software systems have been migrated, which standards have been adjusted or adopted, and the application degree of hybrid solutions. 3. **Challenges faced**: - Identify the technical and organizational challenges encountered in the PQC migration process, such as lack of experience, high implementation difficulty, concerns about the security of new systems, and high complexity. By answering these questions, the paper provides a comprehensive overview of the current situation of PQC migration and provides practical guidance for researchers and implementers, helping them better understand and deal with this rapidly developing research field. ### Formula example Although the content of this article mainly involves the fields of computer science and information security, in order to meet your requirements, the following is a formula example related to PQC: Suppose we are discussing a lattice - based cryptosystem. Its security depends on solving the Shortest Vector Problem (SVP). SVP can be expressed as: \[ \text{SVP:} \quad \min_{\mathbf{v} \in \Lambda \setminus \{\mathbf{0}\}} \|\mathbf{v}\| \] where \(\Lambda\) represents a lattice, \(\mathbf{v}\) is a non - zero vector in the lattice, and \(\|\mathbf{v}\|\) represents the Euclidean norm of the vector. This formula shows the core idea of SVP, that is, to find the non - zero vector with the shortest length in a given lattice. Such problems are crucial for the design of cryptosystems resistant to quantum attacks. Hope this information can help you better understand the goals and content of the paper. If you have more questions or need further explanation, please feel free to let us know!