Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Blockchains in the Quantum Era
Blockchains in the Quantum Era

Blockchains in the Quantum Era

Release Date: 02/05/2021

Working Group: Quantum-safe Security

Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application developers have successfully leveraged the blockchain characteristics of decentralization, immutability, cryptographic security and transparency to create the solution benefits of redundancy, non-repudiation and enhanced auditing/compliance. Blockchain infrastructures make very extensive use of digital signature algorithms, hashing algorithms and public-key cryptography. The rapid pace of progress that is being experienced with quantum computing technology has made the prospect of quantum computer cyber-attacks a very real possibility.

Initiatives are therefore underway to augment today’s DLT/blockchain infrastructures with cryptographic algorithms that are highly resistant to quantum computer attack. These post-quantum algorithms are based on computational problems that are known to be very difficult for quantum computers to solve by using either Shor’s algorithm or Grover’s algorithm. This paper provides an introduction to DLT/blockchain technology, some of its representative applications, and an overview of the leading post-quantum algorithm candidates that are actively being pursued.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
AI Risk Management: Thinking Beyond Regulatory Boundaries
AI Risk Management: Thinking Beyond Regulatory ...
AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects
AI Organizational Responsibilities - Governance...
A Vulnerability Management Crisis: The Issues with CVE
A Vulnerability Management Crisis: The Issues with CVE
Published: 11/21/2024
CSA Community Spotlight: Addressing Emerging Security Challenges with CISO Pete Chronis
CSA Community Spotlight: Addressing Emerging Security Challenges wi...
Published: 11/18/2024
The Hidden Power of Zero Trust Thinking
The Hidden Power of Zero Trust Thinking
Published: 10/30/2024
How CSA Research Uses the Cloud Controls Matrix to Address Diverse Security Challenges
How CSA Research Uses the Cloud Controls Matrix to Address Diverse ...
Published: 10/25/2024

Acknowledgements

Ashish Mehta
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Bruno Huttner
Bruno Huttner

Bruno Huttner

Bruno has co-chaired CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for protecting their networks and their data, for approximately six years. As such, he has participated in writing most of the group’s research papers and has given several presentations about the group’s work. Bruno joined ID Quantique in 2014, where he’s r...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Urmila Nagvekar
Urmila Nagvekar

Urmila Nagvekar

Urmila Nagvekar is a Certified Information Systems Security Professional (CISSP), with a combined 27 years in Information Technology, Security, and Privacy involving leading Cybersecurity, Information Risk Management, and Data Privacy Programs as business value drivers for Engineering and Geoscience with oil majors.

She has been actively contributing and presenting topics related to Blockchain Security at CSA’s Blockchain/DLT Working ...

Read more

Edward Chiu
Edward Chiu
Cybersecurity, Chevron IT Company

Edward Chiu

Cybersecurity, Chevron IT Company

Edward is a Distinguished Engineer in Cybersecurity at Chevron Technical Center. He serves in CSA's Quantum-Safe Security working group, during which time he authored “Preparing Enterprises for the Quantum Computing Cybersecurity Threats,” and co-authored “A Day Without Safe Cryptography.” His experience includes cybersecurity R&D and operations, ...

Read more

Ken Huang
Ken Huang
Chief AI Officer at DistributedApps.ai

Ken Huang

Chief AI Officer at DistributedApps.ai

Ken Huang is an acclaimed author of 8 books on AI and Web3. He is the Co-Chair of the AI Organizational Responsibility Working Group and AI Control Framework at the Cloud Security Alliance. Additionally, Huang serves as Chief AI Officer of DistributedApps.ai, which provides training and consulting services for Generative AI Security.

In addition, Huang contributed extensively to key initiatives in the space. He is a core contributor t...

Read more

John Hooks Headshot Missing
John Hooks

John Hooks

Boulevard A. Aladetoyinbo Esq. Headshot Missing
Boulevard A. Aladetoyinbo Esq.

Boulevard A. Aladetoyinbo Esq.

Nadia Diakun-Thibault Headshot Missing
Nadia Diakun-Thibault

Nadia Diakun-Thibault

Aaron Kent Headshot Missing
Aaron Kent

Aaron Kent

John Young Headshot Missing
John Young

John Young

Andrew Brick Headshot Missing
Andrew Brick

Andrew Brick

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training