IK
I. Kong
5 records found
1
Ensuring the secure provision of data and services using critical information infrastructures amidst the evolving technology landscape is a crucial yet recurrent task. However, these infrastructures can become vulnerable due to developments in quantum computing and modifying the
...
Realizing quantum-safe information sharing
Implementation and adoption challenges and policy recommendations for quantum-safe transitions
By utilizing the properties of quantum mechanics, quantum computers have the potential to factor a key pair of a large prime number and break some of the core cryptographic primitives that most information infrastructures depend on. This means that today's widely used cryptograph
...
The quantum computing-based threats call for a critical information infrastructure to modify widely used cryptographic algorithms to ones that are quantum-safe (QS). Yet, little scholarly research has been undertaken to study QS transition, and the guidance to prepare for socio-t
...
The computation power of quantum computers introduces new security threats in Public Key Infrastructure (PKI), a system used by many governments to secure their digital public services and communication. This calls for an inevitable need for governments to be quantum-safe (QS) by
...
Transitioning Towards Quantum-Safe Government
Examining Stages of Growth Models for Quantum-Safe Public Key Infrastructure Systems
Public Key Infrastructures (PKIs) provide digital public services and communication by securing information-sharing and strong credentials for digital identity management to individuals, businesses, and government agencies. While cryptographic algorithms that current PKI systems
...