Postgraduate research project

Securing digital infrastructures in the post-quantum era

Funding
Competition funded View fees and funding
Type of degree
Doctor of Philosophy
Entry requirements
2:1 honours degree View full entry requirements
Faculty graduate school
Faculty of Engineering and Physical Sciences
Closing date

About the project

In this project, we will carry out a detailed threat analysis of quantum-computer attacks on cyber-physical systems,  which takes into consideration system configurations, data criticality, and the likelihood of the attack. 

Firstly, we will develop a systematic approach to identify system assets at risk (i.e., using classic public key algorithms), which generate a crypto inventory of the system being considered. The latter will be used, in conjunction with techniques such as Attack Trees, to predict the next stages of a quantum-computer attack and how/when the rest of the system will be compromised. 

In this context, we will develop a set of attack scenarios ( e.g., comprising a military communication link that uses RSA-based key exchange, a rogue product software update that uses a compromised elliptic-curve-based signature scheme), subsequently, the project will investigate the development of crypto agile systems.

Quantum computing technology is expected to break existing public-key-cryptography owing to Shor’s algorithm. This means all systems that rely on asymmetric encryption for key establishment and digital signatures are directly affected, weakening the fundamental bases of modern digital infrastructures (banking, emails, and cryptocurrency). 

Therefore, concerted efforts are being made to replace existing cryptographic systems with quantum-resistant algorithms. Recently, NIST announced the first group of “post-quantum-cryptography (PQC)” algorithms that are designed to withstand a quantum computer attack. However, this is only the first step.  Millions of systems/devices need to be re-configured to use quantum-resistant algorithms. Therefore, there is a need for a systematic transition strategy that ensures a safe passage to a quantum-threat-resilient digital world.

A fundamental challenge in this context is “How to identify the most critical systems/devices to transition first”. Addressing this question will help a great deal in understanding how the adversaries may act in the near future to exploit quantum technology.