世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

【分析レポート:技術】量子コンピュータ時代の暗号化技術

Cryptography in the Quantum Computing Era

4Q 2017 | Technology Analysis Report | AN-2477 | 27 pages | 8 tables | 1 figure | PDF |

 

出版社 出版年月価格 ページ数図表数
ABI Research
ABIリサーチ
2017年10月お問い合わせください 27 9

サマリー

量子の進化は現在のサイバーセキュリティ技術に重大な脅威をもたらし、機密性、インテグリティ、個人情報のプライバシー、ビジネス上の関心事、国家安全に重大な懸念をもたらしている。今後十年間内外に量子コンピュータが商用化されることによるサイバーセキュリティに関する甚大な影響の可能性が、量子対応の暗号の開発を推進している。ポスト量子暗号としても知られているこのような研究は、量子コンピュータによる破壊に耐えられる新しい暗号アルゴリズムの開発を目指している。

米国調査会社ABIリサーチの調査レポート「【分析レポート:技術】量子コンピュータ時代の暗号化技術」は、暗号分野における2つの異なるものの関連している概念に注目している。まず量子安全暗号技術(ポスト量子暗号またはPQC)の開発の取組みを検討し、次に量子メカニクス、QKDを利用した現在の暗号化ソリューションを分析し、最後にこの分野のベンダについて概説している。

Quantum developments pose a critical threat to modern cybersecurity technologies and are of grave concern to the confidentiality, integrity, and privacy of personal information, business interests, and national security. The potentially drastic repercussions on cybersecurity by the commercial availability of quantum computers in the next decade or so  is driving the development of quantum-safe cryptography. Also known as post-quantum cryptography, such research looks to the development of new cryptographic algorithms that could withstand breaking by quantum computers. This report looks at two different but related concepts in the field of cryptography. The first examines efforts to develop quantum-safe cryptographic technologies (post-quantum cryptography or PQC). The second analyzes current commercialized solutions in cryptography that make use of quantum mechanics: QKD. The final section of the report provides an overview of vendors in the space.

Companies Mentioned

  • Quantum
  • Rigetti Computing
  • ETSI
  • Source Technologies
  • AES Technologies
  • Venture
  • ECC
  • Intel Corporation
  • Google
  • IBM Corp
  • SecureRF
  • International Technologies
  • LMS
  • Microsoft Corporation

 

 

ABIリサーチの調査レポートの詳細については、サンプルをご請求ください。

(株式会社データリソース 03-3582-2531、office@dri.co.jp)

 



目次

  • 1. QUANTUM COMPUTING TO COME OF AGE
    • 1.1. Cryptography in Danger
    • 1.2. When Theory Becomes Reality
    • 1.3. A New Arms Race
  • 2. POST-QUANTUM CRYPTOGRAPHY
    • 2.1. Breaking Encryption
    • 2.2. Research and Standards Development
    • 2.3. Quantum-Resistant Algorithms
    • 2.4. Crypto-Agility
  • 3. QUANTUM KEY DISTRIBUTION
    • 3.1. In Theory
    • 3.2. Practical Applications
    • 3.3. Deployment Challenges
    • 3.4. Market Commercialization
  • 4. VENDOR ECOSYSTEM
    • 4.1. CipherQ
    • 4.2. Crypta Labs
    • 4.3. CryptoExperts
    • 4.4. ID Quantique
    • 4.5. ISARA
    • 4.6. MagiQ Technologies
    • 4.7. Post-Quantum Solutions
    • 4.8. Qubitekk
    • 4.9. QuintessenceLabs
    • 4.10. QuNu Labs
    • 4.11. SecureRF

 

ページTOPに戻る

プレスリリース

[サマリー訳]

量子の進化は現在のサイバーセキュリティ技術に重大な脅威をもたらし、機密性、インテグリティ、個人情報のプライバシー、ビジネス上の関心事、国家安全に重大な懸念をもたらしている。今後十年間内外に量子コンピュータが商用化されることによるサイバーセキュリティに関する甚大な影響の可能性が、量子対応の暗号の開発を推進している。ポスト量子暗号としても知られているこのような研究は、量子コンピュータによる破壊に耐えられる新しい暗号アルゴリズムの開発を目指している。

米国調査会社ABIリサーチの調査レポート「【分析レポート:技術】量子コンピュータ時代の暗号化技術」は、暗号分野における2つの異なるものの関連している概念に注目している。まず量子安全暗号技術(ポスト量子暗号またはPQC)の開発の取組みを検討し、次に量子メカニクス、QKDを利用した現在の暗号化ソリューションを分析し、最後にこの分野のベンダについて概説している。

[サマリー原文]

Quantum developments pose a critical threat to modern cybersecurity technologies and are of grave concern to the confidentiality, integrity, and privacy of personal information, business interests, and national security. The potentially drastic repercussions on cybersecurity by the commercial availability of quantum computers in the next decade or so  is driving the development of quantum-safe cryptography. Also known as post-quantum cryptography, such research looks to the development of new cryptographic algorithms that could withstand breaking by quantum computers. This report looks at two different but related concepts in the field of cryptography. The first examines efforts to develop quantum-safe cryptographic technologies (post-quantum cryptography or PQC). The second analyzes current commercialized solutions in cryptography that make use of quantum mechanics: QKD. The final section of the report provides an overview of vendors in the space.

 


[プレスリリース原文]

Modern Cybersecurity Totally Futile in Quantum Computing Era

Acceleration of Quantum Safe Cryptography is a Critical Obligation

 

Oyster Bay, New York - 24 Oct 2017

Quantum computing uses the power of atoms to perform memory and processing tasks and remains a theoretical concept. However, it is widely believed that its creation is possible. Most experts now agree that the creation of a quantum computer is simply a matter of engineering, and that the theoretical application will happen. Optimistic estimates for commercialization by the private sector vary between 5 and 15 years, while more conservative estimates by academics put it at 15-25 years.

The drive to create the first quantum computer has been viewed as the new arms race. The milestone to reach is that of quantum supremacy, essentially the performance of computation that goes beyond the capability of the latest and best supercomputers in existence today. But this drive is underpinning another, more pressing race: quantum cybersecurity.

ABI Research, the leader in emerging technology intelligence, forecasts that the first attack-capable quantum machines will make their market debut by 2030. Michela Menting, Research Director at ABI Research warns, “When they do, even the latest and best in class cybersecurity technologies will be vulnerable.” 

The race to quantum supremacy is real: governmental R&D is accelerating the crystallization of the quantum computer, with more than US$1.6 billion already invested globally. The potentially drastic repercussions on cybersecurity is equally real and has led to the focus on quantum-safe cryptography. Also known as post quantum cryptography, such research looks to the development of new cryptographic algorithms that could withstand breaking by quantum computers, ideally before such computers become commercially available. Standards agencies the world over, including the NIST and ETSI, are focusing their efforts on developing appropriate standards as time grows increasingly shorter. 

Beyond and ahead of quantum computers, the use of the theory has also aided in developing new cryptographic techniques, notably quantum key distribution (QKD). Considered as a type of quantum-safe cryptography, QKD will likely be commercialized before the advent of quantum computers, because it is achievable using current technologies such as lasers and fiber optics. In that sense, QKD is one of the first quantum theories to find real-world applications.

Heavy private sector investment is going into quantum R&D. Since 2012, VC funds have pumped over US$334 million into companies specializing in the space. Those standing out in the space include CipherQ, CryptaLabs, CryptoExperts, ID Quantique, ISARA, MagiQ Technologies, Post-Quantum Solutions, Qubitekk, QuintessenceLabs, QuNu Labs, and SecureRF.

“The transition to quantum resistant cryptography is bound to take time but enterprises should already start considering how to address this future security gap in in their risk assessments and pay attention to both standard developments and market solutions,” Menting concludes.

These findings are from ABI Research’s Cryptography in the Quantum Computing Era report. This report is part of the company’s Digital Security research service, which includes research, data, and analyst insights.

 

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問合は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問合せはこちらのフォームから承ります

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

<無料>メルマガに登録する

 

 

ページTOPに戻る