1、Towards migration to secure information infrastructures even in quantum computers eraWhite Paper on Migration to Post-Quantum CryptographyCyber Security Department,NTT DATA Group Corporation,JapanE-mail:security-contactkits.nttdata.co.jpPublication Date:October 3,2023This document was created by NTT
2、 DATA Group Corporation with the support from NTT Social Informatics Laboratories.The names of companies,products,services listed in this document are the trademarks or registered trademarks of the companies concerned.2023 NTT DATA Group CorporationTable of Contents1.Introduction2.Necessity for migr
3、ation to Post-Quantum Cryptography(PQC)3.Focal points when migrating to PQC4.When and how to migrate21.IntroductionCurrentFutureEncrypted dataStoreServerAttackerStealEavesdropEncrypted dataPlaintextQuantum ComputerDecryptEnterpriseInformation leakDatabase 2023 NTT DATA Group Corporation3IT systems a
4、nd cryptographic technologiesIn recent years,cryptographic technologies are widely used as a base in IT systems.For example,encryption is used to protect information by making it look like meaningless data even if data flowing oncommunication paths or data stored in storage is eavesdropped or stolen
5、 by an attacker.In addition,digitalsignatures are used to ensure that data was created by yourself and it has not been tampered.Bothencryption and digital signatures are typical cryptographic technologies that support todays society.On the other hand,in recent years,quantum computer implementation t
6、echnology has made remarkableprogress.Quantum computers have a potential to make it possible to perform calculations in a short periodof time,which conventionally could not be completed within a realistic timeframe,and are expected to beapplied to research such as AI and drug discovery.However,in ge