Making existing software quantum safe: A case study on IBM Db2
The software engineering community is facing challenges from quantum computers (QCs). In the era of quantum computing, Shor’s algorithm running on QCs can break asymmetric encryption algorithms that classical computers practically cannot. Though the exact date when QCs will become “dangerous” for practical problems is unknown, the consensus is that this future is near. Thus, the software engineering community needs to start making software ready for quantum attacks and ensure quantum safety proactively.
We argue that the problem of evolving existing software to quantum-safe software is very similar to the Y2K bug. Thus, we leverage some best practices from the Y2K bug and propose our roadmap, called 7E, which gives developers a structured way to prepare for quantum attacks. It is intended to help developers start planning for the creation of new software and the evolution of cryptography in existing software.
In this paper, we use a case study to validate the viability of 7E. Our software under study is the IBM Db2 database system. We upgrade the current cryptographic schemes to post-quantum cryptographic ones (using Kyber and Dilithium schemes) and report our findings and lessons learned.
We show that the 7E roadmap effectively plans the evolution of existing software security features towards quantum safety, but it does require minor revisions. We incorporate our experience with IBM Db2 into the revised 7E roadmap.
The U.S. Department of Commerce’s National Institute of Standards and Technology is finalizing the post-quantum cryptographic standard. The software engineering community needs to start getting prepared for the quantum advantage era. We hope that our experiential study with IBM Db2 and the 7E roadmap will help the community prepare existing software for quantum attacks in a structured manner.
Thu 6 MarDisplayed time zone: Eastern Time (US & Canada) change
14:00 - 15:30 | Defect Prediction & AnalysisResearch Papers / Industrial Track / Journal First Track at L-1710 Chair(s): Rrezarta Krasniqi University of North Carolina at Charlotte | ||
14:00 15mTalk | An ensemble learning method based on neighborhood granularity discrimination index and its application in software defect prediction Research Papers Yuqi Sha College of Information Science and Technology,Qingdao University of Science and Technology, Feng Jiang College of Information Science and Technology,Qingdao University of Science and Technology, Qiang Hu College of Information Science and Technology, Qingdao University of Science and technology, Yifan He Institute of Cosmetic Regulatory Science,Beijing Technology and Business University | ||
14:15 15mTalk | ALOGO: A Novel and Effective Framework for Online Cross-project Defect Prediction Research Papers Rongrong Shi Beijing Jiaotong University, Yuxin He Beijing Jiaotong University, Ying Liu Beijing Jiaotong University, Zonghao Li Beijing Jiaotong University, Jingxin Su Beijing Jiaotong University, Haonan Tong Beijing Jiaotong University | ||
14:30 15mTalk | Cross-System Software Log-based Anomaly Detection Using Meta-Learning Research Papers Yuqing Wang University of Helsinki, Finland, Mika Mäntylä University of Helsinki and University of Oulu, Jesse Nyyssölä University of Helsinki, Ke Ping University of Helsinki, Liqiang Wang University of Wyoming Pre-print | ||
14:45 15mTalk | RADICE: Causal Graph Based Root Cause Analysis for System Performance Diagnostic Industrial Track Andrea Tonon Huawei Ireland Research Center, Meng Zhang Shandong University, Bora Caglayan Huawei Ireland Research Center, Fei Shen Huawei Nanjing Research Center, Tong Gui , Mingxue Wang Huawei Ireland Research Center, Rong Zhou | ||
15:00 15mTalk | Can We Trust the Actionable Guidance from Explainable AI Techniques in Defect Prediction? Research Papers | ||
15:15 15mTalk | Making existing software quantum safe: A case study on IBM Db2 Journal First Track Lei Zhang University of Maryland Baltimore County, Andriy Miranskyy Toronto Metropolitan University (formerly Ryerson University), Walid Rjaibi IBM Canada Lab, Greg Stager IBM Canada Lab, Michael Gray IBM, John Peck IBM |