ePrivacy and GPDR Cookie Consent by Cookie Consent

🍂 Autumn reading time! Let our AI Librarian find your perfect cozy read 🫖

Evaluating Cryptographic Vulnerabilities Created by Quantum Computing in Industrial Control Systems

by Alvin Moon , Chad Heitzenrater , Domenique Lumpkin , Edward Parker , Michael J D Vermeer

📖 The Scoop

Industrial control systems (ICSs) and operational technology (OT) used in critical infrastructure are increasingly converging with enterprise information technology (IT). As this happens, OT systems' security posture must adapt to a new threat landscape and adopt some of the same security controls as those used in enterprise IT, especially cryptographic controls that rely on public-key cryptography, which are ubiquitous in enterprise IT systems. Although many industrial networks are still in the early stages of adopting some of these controls, a new threat to this foundational element of modern information security looms ahead: quantum computing. Quantum computing will eventually be able to break the public-key cryptography algorithms currently used throughout IT infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure. To prepare for the future capabilities of quantum computing, a concerted effort is underway across the United States to migrate to post-quantum cryptography (PQC), but this migration will have unique implications for ICSs and OT systems. Despite the convergence of IT and OT, significant differences remain between IT and OT environments, and the cryptographic vulnerabilities created by quantum computing will not affect IT and OT the same way. These differences have implications both for how OT systems will need to be prepared for the migration to PQC and for mitigation priorities. Thus, this report provides a framework for evaluating quantum computing-related cryptographic vulnerabilities in critical infrastructure ICSs and OT systems to better understand the implications of the migration to PQC and to identify mitigation priorities.

Genre: Business & Economics / Infrastructure (fancy, right?)

🤖Next read AI recommendation

AI Librarian

Greetings, bookworm! I'm Robo Ratel, your AI librarian extraordinaire, ready to uncover literary treasures after your journey through "Evaluating Cryptographic Vulnerabilities Created by Quantum Computing in Industrial Control Systems" by Alvin Moon! 📚✨

AI Librarian

AI Librarian

Eureka! I've unearthed some literary gems just for you! Scroll down to discover your next favorite read. Happy book hunting! 📖😊

Reading Playlist for Evaluating Cryptographic Vulnerabilities Created by Quantum Computing in Industrial Control Systems

Enhance your reading experience with our curated music playlist. It's like a soundtrack for your book adventure! 🎵📚

🎶 A Note About Our Spotify Integration

Hey book lovers! We're working on bringing you the full power of Spotify integration. 🚀 Our application is currently under review by Spotify, so some features might be taking a little nap.

Stay tuned for updates – we'll have those playlists ready for you faster than you can say "plot twist"!

Login with Spotify

🎲AI Book Insights

AI Librarian

Curious about "Evaluating Cryptographic Vulnerabilities Created by Quantum Computing in Industrial Control Systems" by Alvin Moon? Let our AI librarian give you personalized insights! 🔮📚