Making existing software quantum safe: A case study on IBM Db2

dc.contributor.authorZhang, Lei
dc.contributor.authorMiranskyy, Andriy
dc.contributor.authorRjaibi, Walid
dc.contributor.authorStager, Greg
dc.contributor.authorGray, Michael
dc.contributor.authorPeck, John
dc.date.accessioned2024-02-28T14:18:40Z
dc.date.available2024-02-28T14:18:40Z
dc.date.issued2023-05-23
dc.description.abstractContext: The software engineering community is facing challenges from quantum computers (QCs). In the era of quantum computing, Shor’s algorithm running on QCs can break asymmetric encryption algorithms that classical computers practically cannot. Though the exact date when QCs will become “dangerous” for practical problems is unknown, the consensus is that this future is near. Thus, the software engineering community needs to start making software ready for quantum attacks and ensure quantum safety proactively. Objective: We argue that the problem of evolving existing software to quantum-safe software is very similar to the Y2K bug. Thus, we leverage some best practices from the Y2K bug and propose our roadmap, called 7E, which gives developers a structured way to prepare for quantum attacks. It is intended to help developers start planning for the creation of new software and the evolution of cryptography in existing software. Method: In this paper, we use a case study to validate the viability of 7E. Our software under study is the IBM Db2 database system. We upgrade the current cryptographic schemes to post-quantum cryptographic ones (using Kyber and Dilithium schemes) and report our findings and lessons learned. Results: We show that the 7E roadmap effectively plans the evolution of existing software security features towards quantum safety, but it does require minor revisions. We incorporate our experience with IBM Db2 into the revised 7E roadmap. Conclusion: The U.S. Department of Commerce’s National Institute of Standards and Technology is finalizing the post-quantum cryptographic standard. The software engineering community needs to start getting prepared for the quantum advantage era. We hope that our experiential study with IBM Db2 and the 7E roadmap will help the community prepare existing software for quantum attacks in a structured manner.
dc.description.sponsorshipWe are grateful to IBM Centre for Advanced Studies (Project #1121) for financial support.
dc.description.urihttps://www.sciencedirect.com/science/article/pii/S0950584923001039
dc.format.extent25 pages
dc.genrejournal articles
dc.genrepreprints
dc.identifierdoi:10.13016/m2m70i-jtb6
dc.identifier.citationZhang, Lei, Andriy Miranskyy, Walid Rjaibi, Greg Stager, Michael Gray, and John Peck. “Making Existing Software Quantum Safe: A Case Study on IBM Db2.” Information and Software Technology 161 (September 1, 2023): 107249. https://doi.org/10.1016/j.infsof.2023.107249.
dc.identifier.urihttps://doi.org/10.1016/j.infsof.2023.107249
dc.identifier.urihttp://hdl.handle.net/11603/31735
dc.language.isoen_US
dc.publisherElsevier
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.titleMaking existing software quantum safe: A case study on IBM Db2
dc.typeText
dcterms.creatorhttps://orcid.org/0000-0001-9343-3654

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2110.08661.pdf
Size:
440.34 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: