
Abstract
The present document presents the results of a simplified threat assessment following the guidelines of ETSI TS 102 165-1 [i.3] for a number of use cases. The method and key results of the analysis is described in clause 4. The present document makes a number of assumptions regarding the timescale for the deployment of viable quantum computers, however the overriding assertion is that quantum computing will become viable in due course. This is examined in more detail in clause 5. The impact of quantum computing attacks on the cryptographic deployments used in a number of existing industrial deployment scenarios are considered in clause 7.
General Information
Publication date: 02 March 2017
Working groups: https://www.etsi.org/technologies/quantum-safe-cryptography
ICT rolling plan topic: Quantum Computing
SDO: ETSI
Latest publishied version: V1.1.1 (2017-03)