=Paper=
{{Paper
|id=Vol-3057/paper2.pdf
|storemode=property
|title=Security Threat Model Based on Analysis of Foreign National Quantum Programs
|pdfUrl=https://ceur-ws.org/Vol-3057/paper2.pdf
|volume=Vol-3057
|authors=Alexei S. Petrenko,Sergei A. Petrenko,Krystina A. Makoveichuk,Alexander V. Olifirov,Hristo Krachunov
}}
==Security Threat Model Based on Analysis of Foreign National Quantum Programs==
Security Threat Model Based on Analysis of Foreign National Quantum Programs Alexei S. Petrenko 1, Sergei S. Petrenko 1, Krystina A. Makoveichuk 2, Alexander V. Olifirov2, Hristo Krachunov 3 1 Saint Petersburg Electrotechnical University "LETI", 5, Professor Popov Street, St. Petersburg, 197376, Russia 2 V.I. Vernadsky Crimean Federal University, 4, Akademika Vernadsky Avenue, Simferopol, 295007, Crimea 3 Technical University of Varna, Studentska 1, Varna, 9010, Bulgaria Abstract Currently, 17 technologically developed countries of the world (USA, China, Russia, France, Germany, Great Britain, Israel, South Korea, Australia, Japan, etc.) are implementing national quantum programs to support exploratory research, R&D in the field of quantum technologies (Q). At the same time, in 12 countries, the mentioned programs are funded by the state, and leading scientific institutions, advanced research agencies for military intelligence and defense structures, as well as leading public and private universities in the field of natural sciences are involved in their implementation. Other countries of the world are actively participating in international programs for the development of quantum technologies. At the same time, national quantum programs are defined by the governments of these countries as critical for the national security and economic competitiveness of the state. Consider the national quantum programs of the United States and its partners in the NATO bloc to form a model of security threats to the critical information infrastructure of the Russian Federation. Keywords 1 National quantum program, roadmap for the development of quantum technologies, quantum computing and computers, quantum and post-quantum cryptography, quantum cryptanalysis algorithms, quantum algorithms of Shor, Grover, and Simon, quantum Fourier transform, factorization and discrete logarithm problem. 1. Introduction According to leading Russian political scientists [1, 3-5], the modern world is going through a period of profound changes, the essence of which is the formation of a polycentric international system: the world’s potential for power and development is being dispersed and shifted to the Asia-Pacific region. The ability of the historic West to dominate the world economy and politics is shrinking; the contradictions arising from uneven world development, the widening of the gap between the welfare of States, the intensification of competition for resources, access to markets, and control of transport routes have become more pronounced. The desire of Western States to maintain their positions, including by imposing their views on global processes and by pursuing a policy of containing alternative centers of power, has led to increased instability in international relations, Increased turbulence at the global and regional levels. The struggle to dominate the formation of key principles for the organization of the future international system is becoming a major trend in the current stage of world development; Proceedings of VI International Scientific and Practical Conference Distance Learning Technologies (DLT–2021), September 20-22, 2021, Yalta, Crimea EMAIL: A.Petrenko1999@rambler.ru (A.1); s.petrenko@rambler.ru (A. 2); christin2003@yandex.ru (A. 3); alex.olifirov@gmail.com (A.4); euro_expert@abv.bg (A.5) ORCID: 0000-0002-9954-4643 (A.1); 0000-0003-0644-1731 (A.2); 0000-0003-1258-0463 (A.3); 0000-0002-5288-2725 (A.4); 0000-0002-7044-9642 (A.5) ©️ 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 11 in the face of increasing political, social, economic divisions and instability in the world political and economic system, the role of force in international relations is becoming more important. The development and modernization of force capabilities and the development and deployment of new types of weapons undermine strategic stability and threaten the global security provided by the system of arms control treaties and agreements. While the risk of a large-scale war, including nuclear war, between the major States remains low, the risks of their being drawn into regional conflicts and crises are increasing; in addition to military power, important influences of States on international policy, such as economic, legal, technological, and information-related factors, have come to the fore. The pursuit of appropriate opportunities to pursue geopolitical interests is detrimental to the search for solutions to disputes and existing international problems through peaceful means based on international law; the use of instruments of «soft power», first of all, the possibilities of civil society, humanitarian and information-communication, and technologies to solve foreign policy problems, becomes an integral part of modern international policy, in addition to traditional diplomatic methods [2, 6, 7]. Western states, primarily the United States and NATO countries, are striving in every possible way to use technological superiority in the field of artificial intelligence (AI), quantum technologies (Q), collection and processing of big data (Big Data + ETL), high and ultra-high performance machine computing (up to 10 Exaflops) to dominate the information space. At the same time, it raises concern that information technologies are increasingly being used by these countries for military-political purposes, including for the implementation of actions aimed at undermining the sovereignty, political and social stability, and the territorial integrity of the Russian Federation. For example, the National Quantum Initiative (2018) aims to maintain US technological leadership in quantum technology in the medium and long term. To this end, a series of (more than 80) dual-use research and development projects have been launched since 2019 under the United States National Security Agency (NSA), the Intelligence Advanced Research Projects Activity (IARPA), The Defense Advanced Research Projects Agency (DARPA), the United States National Science Foundation (NFS), the United States Department of Energy (DOE), etc. At the same time, the US budget for the development of quantum technologies in 2021 exceeded US $ 2.2 billion (for comparison, China’s budget is US $ 2.5 billion, Russia’s budget is the US $ 0,8 billion) (see Fig. 1). Let us consider the structure and content of the aforementioned US quantum initiative in more detail. Figure 1: Open budgets of high-tech countries of the world for the development of quantum technologies (Q) 12 2. US Quantum Initiative 2018 Some specific steps by the United States military and political leadership and scientific community preceded the National Quantum Initiative (2018). At the end of 2017, the issue became particularly pressing, as US political elites began to have serious fears of falling behind, mostly from China, in the global quantum computing race. On the instructions of the US Congress (one of the three highest federal government bodies of the US), the National Security Agency (NSA) has produced a series of classified reports assessing the military- technical capabilities of the United States and its opponents in the area of quantum technology. In these documents, the following issues were presented in expanded form: structure and comparison of costs for national quantum initiatives of the US and NATO countries, as well as their opponents; the quantity and quality of previously conducted scientific and technical research; evaluation of the practical value of scientific results; assessment of the potential of an appropriate pilot framework; evaluation of the quality of training of military and civilian specialists in the field of quantum technology, etc. Further, a Memorandum (2018) was developed on budgetary priorities of the US presidential administration in the field of dual-use R&D. At the same time, the following areas of promising research were identified: quantum technologies (Q), quantum communications, quantum computers, quantum computing, quantum, and post-quantum cryptography. The goal was to maintain the technological leadership of the United States in the field of quantum technologies in the medium and long term. Finally, in 2018, the United States drafted the National Quantum Initiative Act, which plans to allocate substantial funds for the following developments: the US National Institute of Standards and Technology (NIST) of $ 400 billion (80 million per year) for the organization and conduct of scientific events on specified topics; the US National Science Foundation (NSF) of $ 250 million (50 million per year) for the creation and development of interdisciplinary research centers for exploratory research and training (Multidisciplinary Centers for Quantum Research and Education); the Coordination Office of the United States of $ 200 billion (40 million per year) for project management in the field of quantum technologies. Further, during the discussion of budget items in the US House of Representatives, the US Department of Energy was allocated an additional $ 625 million ($ 125 million per year) for the creation of five leading research centers (National Quantum Information Science Research Centers). As a result, the total amount of funding for the implementation of the US national quantum initiative amounted to the US $ 1.275 billion. On December 21, 2018, WE President Donald Trump approved this budget. The US National Science Foundation (NSF) has two strategic projects planned for the period 2019- 2025. The first is to create a "practical" quantum computer (Software-Tailored Architecture for Quantum co-design, STAQ). The main goals of this project were: –development of a promising architecture of a quantum computer with 64 and more qubits; –providing the required stability and noise immunity of the functioning of quantum computers in real operating conditions; –development of quantum algorithms, systems, and applied software for solving scientific and technical problems of dual-use. The second project, «Enabling Quantum Leap: Convergent Accelerated Discovery Foundries for Quantum Materials Science, Engineering, and Information, Q-AMASE-i», was aimed at creating new samples of quantum materials. The total amount of financing for these projects was USD 25 million. US Department of Energy 2019-2024 funded 85 promising quantum technology projects totaling the US $ 218 million. Including the project of the National Laboratory «Lawrence Berkeley National Laboratory» (LBNL / Berkeley Lab) to create a special test laboratory (Advanced Quantum Testbed, AQT). At the same time, the Lincoln Laboratory of the Massachusetts Institute of Technology (MIT- Lincoln Laboratory, MIT-LL) was involved to develop a program and testing methodology for various architectures of quantum computers. 13 Also in 2018, another major US bill, the Quantum Computing Research Act of 2018, was passed to support scientific and technological research for the interests of the US military. In 2019, the Under Secretary of Defense for Research and Engineering prepared the "Advanced R&D Plan (for the period 2019-2025)" in the following areas: creation of new forms of weapons and equipment based on quantum technologies (Q); development of promising models and methods for collecting and processing big data (Big Data) based on quantum technologies (Q), methods of artificial intelligence (AI), and machine learning (ML) (national security data sets); development of quantum algorithms for solving military-technical problems of analysis and synthesis (including cryptanalysis problems); creation of trusted quantum communication systems, including the development of an appropriate component base and communication protocols; development of quantum computers for 100 or more logical qubits; development of mathematical and software for quantum computers; development of promising architectures of quantum systems and networks for performing quantum computations; development of models and methods of quantum and post-quantum cryptography, etc. [29, 30]. Starting in 2019, the R&D section of the US defense budget provides for annual funding for fundamental and applied research in the field of quantum technologies. For example, the US Army (feature 0601102A) and the US Navy (feature 0601153N) receive $ 5 million annually for related research. It is interesting to note that the Defense Budget under Advanced Simulation and Computing has earmarked more than $ 700 million annually for the US Department of Energy, which is significantly higher than the Pentagon's "quantum" budget. This is due to the fundamental nature of the alleged exploratory research in the field of quantum technology. Note that the number of Multidisciplinary University Research Initiative (MURI) for the needs of the US Department of Defense has grown from 12 projects in 2016 to 60 projects in 2021. One such project is the Tri-Service Quantum Science and Engineering Program (QSEP), an interdisciplinary university project. Additionally, IARPA and DARPA have undertaken some dual-use R&D projects with the following objectives: overcoming the limitations of known quantum systems (Logical Qubits Program) (during 2020– 2023); effective solution of optimization problems (Quantum Enhanced Optimization Program) (during 2020-2023); development of effective quantum cryptanalysis algorithms (Quantum Cryptanalysis) (during 2021-2024) (Table 1 and Table 2), etc. [9–18, 25-27, 31, 32]. Table 1 Assessment of the cryptographic strength of known encryption algorithms Symmetric key FFC (DSA, D-H, Bits of security IFC (RSA) ECC (ECDSA) algorithms MQV) L=1024 80 (up to 2010) 2TDEA, SKIPJACK k=1024 f=160-223 N=160 L=2048 112 (up to 2030) 3TDEA k=2048 f=224-255 N=224 L=3072 128 (after 2030) AES-128 k=3072 f=256-383 N=256 L=7680 192 AES-192 k=7680 f=384-511 N=384 L=15360 256 AES-256 k=15360 f=512+ N=512 14 Table 2 Resources Required for Quantum Solving of Factorization Problems and Key Finding of Known Symmetric Encryption Cryptosystems Resources for Quantum Factorization and ECDLP Factorization ECDLP Number of Quantum Number of Quantum Classic time n n qubits time qubits time 9 512 1024 0.54*10 110 700 0.5*109 6.4*1016 9 9 1024 2048 4.3*10 163 1000 1.6*10 3.0*1024 2048 4096 34*109 224 1300 4.0*109 9.2*1033 9 9 3072 6114 120*10 256 1500 6.0*10 6.0*1038 15360 30720 1.5*1013 512 2800 50*109 2.1*1077 Resources for a quantum solution to the problem of finding the key of a symmetric cryptosystem k Number of qubits Quantum time Classic time 56 56 2.1*108 7.2*1016 80 80 8.6*1011 1.2*1024 16 112 112 5.7*10 5.2*1033 128 128 1.4*1019 3.4*1038 25 168 168 1.5*10 3.7*1050 256 256 2.7-1038 1.2*1077 Leading public and private universities were involved to carry out the set R&D. For example, the University of Southern California has become a leader in a consortium of universities and private companies for five-year R&D (2017-2022) of IARPA with a budget of $ 45 million to develop the world's first 100-qubit quantum computer. This consortium also included: Lincoln Laboratory (MIT- LL), California Institute of Technology (Caltech, USA), Harvard University (Harvard, USA), University of California at Berkeley (UC Berkeley, USA), University College London (London, Britain), University of Waterloo (Waterloo, Canada), Saarland University (Saarland, Germany), Tokyo Institute of Technology (Tokyo, Japan), American companies Lockheed Martin and Northrop Grumman. Acceptance of the results of the mentioned R&D will be carried out by representatives of the Ames Research Center (NASA's Ames Research Center) and Texas A&M University (Texas A&M). In 2021, the budget of the US National Quantum Initiative was revised upward (National Quantum Initiative Supplement to the President's FY 2021 Budget) (see Fig. 2). The total budget for the implementation of the US National Quantum Initiative exceeded the US $ 2.5 billion. At the same time, more than $ 50 million from this budget is planned for the development of quantum algorithms (including quantum cryptanalysis algorithms) (see Fig. 6) in the interests of the intelligence community and the armed forces of the United States and NATO countries [1, 6, 7, 12-18]. Thus, starting in 2018, research and development in the field of quantum technologies in the United States and NATO countries have been under the scrutiny of government and military structures. The strategic objective is to maintain technological leadership in this area in the medium and long term. The large public investment in quantum technology in the United States (over US $ 2.5 billion) is due to the strategic importance of these technologies for national security, including information domination. Private investment from major USA IT manufacturers and service providers, including Amazon, Google, IBM, Intel, and Microsoft, also contributes to this goal. Other companies such as SpaceX, Lockheed Martin, and Boeing are already putting quantum technology into practice to solve specific technology challenges. In total, investments by private companies in the United States on quantum technologies have approached $ 1 billion per year. At the same time, private investment continues to grow, not only in the United States but also in other countries, for example, in China, Germany, Great Britain, France, Japan, and Singapore. 15 Figure 2: Priority for the development of quantum algorithms in the interests of the US Department of Defense 3. National Quantum Programs The list of well-known national quantum programs is given in Table 3. The main goals of national quantum programs are the cooperation of stakeholders in academia and industry to carry out promising dual-use R&D in the field of quantum technologies, as well as to promote the translation of exploratory research into a practical plane. An additional goal is the development of human capital (or resource). Some programs set clear medium-term goals, for example, by 2030 (or earlier) to develop a working industrial prototype of a "practical" quantum computer, as well as to develop scenarios for its use to create an ecosystem of quantum technologies [1, 6, 7, 12-18, 33-35]. The main tasks of the national quantum programs include: creation of scientific and technical centers of excellence in the field of quantum technologies; organization and conduct of promising dual-use R&D on a given topic; providing direct funding for special dual-use projects; provision of public investment or start-up capital to enterprises producing new quantum technologies. The majority of national quantum programs have four main research areas [2-5, 12-18] (see Fig. 3): quantum computers and computing; quantum communications (near-term perspective). quantum cryptanalysis (near-term perspective); quantum cryptography. So, in quantum cryptography [2-7, 9-18] the following key technologies are defined: quantum key distribution (QKD) and quantum encryption in fiber-optic communication channels and open space; quantum hashing and quantum digital signature; quantum cryptanalysis; quantum superdense coding of information using "entangled" and "hyper-entangled" particles (one quantum bit (qubit) can carry up to two ordinary bits), which allows increasing the bandwidth of the quantum communication channel; coding in systems of quantum information transfer, etc. 16 Table 3 List of well-known national quantum programs of technologically developed countries of the world* Country Name of the national quantum program Budget and deadlines More than $ 2.5 billion, USA National Quantum Initiative (2018) 2018–2023 Quantum technology R&D as a strategic $ 15.3 billion (for the China industry in Five Year Plans and “Made in creation of an experimental China 2025” center), 2020–2025 Quantum Technologies — From Basic Germany $ 2.4 billion, 2018–2023 Research to Market (2018) National Quantum Technologies Programme United Kingdom $ 1.23 billion, 2013–2022 (2013) National Strategy for Quantum Technologies France $ 1.2 billion, 2021–2024 (2021) National Mission on Quantum Technologies India $ 1.08 billion, 2020–2025 & Applications (2020) National Agenda for Quantum Technology: Netherlands $ 850 million, 2019–2024 Quantum Delta NL (2019) Quantum Technology Development $ 691 million (RUB 51.1 Russia Roadmap (2019) billion), 2019–2024 National Program for Quantum Science and Israel $ 380 million, 2019–2025 Technology (2019) Quantum Technology Innovation Strategy Japan $ 206 million, 2020–2025 (2020) Other EU countries Quantum Technologies Flagship (2018) $ 181 million, 2018–2021 Quantum Canada Strategy Canada $ 149.7 million, 2017–2022 (in development since 2016) «Growing Australia’s Quantum Technology Australia $ 98.6 million, 2020–2024 Industry» (2020) Singapore Quantum Engineering Program (2018) $ 90.9 million, 2018–2025 Quantum Computing Technology South Korea $ 40.9 million, 2019–2024 Development Project (2019) * Source: https://cifar.ca/cifarnews/2021/04/07/a-quantum-revolution-report-on-global-policies- for-quantum-technology/. Note that in the problems of quantum cryptanalysis, it is taken into account that Shor's algorithm provides exponential acceleration of solving factorization problems, discrete logarithm (DLP), and discrete logarithm with an elliptic curve (ECDLP) (see Table 4), which are widely used in cryptographic applications in cyberspace. For example, the well-known protocols TLS, SSH, IPSec, etc. rely on Diffie-Hellman key agreements (which depend on the strength of DLP or ECDLP), digital signatures (DSA, ECDSA, or RSA-PSS signatures), or public key encryption (El Gamal, RSA-OAEP). As a result, Shor's quantum algorithm can potentially break most protocols and asymmetric encryption schemes (public-key cryptography) [8–18]. In general, all known quantum algorithms (see Table 5) can be conditionally divided into two groups: providing exponential gain (for example, Shor's algorithm) and providing quadratic gain (for example, Grover's algorithm) [1-6, 8-11]. Particular attention is paid to Shor's quantum algorithm and other polynomial algorithms capable of solving cryptanalysis problems with the required reliability and laboriousness in polynomial time [8-19]. 17 Figure 3: The main directions of development of quantum technologies in national quantum programs Table 4 Estimate for the complexity of the decomposition of a large integer into prime factors Classic exascale computer (1018 op / s) versus a quantum computer in the megahertz range (1 million op / s) Number of decimal places, k k = 250 k = 500 k = 1000 The complexity of the classical 200 h 5 million years 4*1017 years algorithm The complexity of the quantum 4 sec 18 sec 84 sec algorithm, s Also quite interesting is the quantum Grover search algorithm, which allows you to speed up algorithms for solving some problems of the NP class - those problems for which a better algorithm than direct search is unknown. For example, to speed up the search for a key to cryptosystems such as the well-known DES algorithm. Also interesting is the quantum Fourier transform, which allows you to solve the problems of calculating the discrete logarithm and factorization and "hack" with the help of a quantum computer many cryptosystems, for example, RSA. According to the reports of the American National Standards Institute NIST, of the crypto algorithms used in the USA and NATO countries, AES, SHA-2, SHA-3, RSA, ECDSA, ECDH, and DSA are susceptible to the quantum threat. It is noted that quantum computers allow computing at completely different speeds than modern 5th generation Supercomputers, which makes the problem of decrypting ciphertext a real threat. 18 Table 5 Basic quantum algorithms for solving cryptanalysis problems Full brute-force search of encryption algorithms Grover's Algorithm Slide attack, discrimination method for CBC- MAC, PMAC, GMAC, GCM, OCB, Feistel Simon's algorithm networks Determination of the key of the Evan - Mansoor Combination of Grover's and Simon's scheme, FX-constructions, generalized Feistel algorithms networks Random walks, a combination of Grover's and Matching Method, Meet-in-the-Middle Attack Simon's algorithms Factorization and discrete logarithm Shor's algorithm, Ecker's algorithm Search for linear and difference relations, key Bernstein - Vazirani, Grover, and Simon recovery from the difference ratio algorithms Special methods Grover's Algorithm Search for collisions, multi-collision Random walks, Grover's algorithm, etc. SLN solution, algebraic attack AES, Trivium, Harrow, Hassidim, Lloyd SHA-3, MRKS Thus, from the point of view of quantum computing, all cryptography can be conditionally divided into quantum-safe and quantum-unsafe (see Table 6). Algorithms and cryptosystems of symmetric encryption (including AES or GOST R 34.12–2015), but with a key length increased at least twice (how long will be sufficient is still unknown), can be classified as quantum-safe. Asymmetric encryption algorithms and cryptosystems based on the complexity of the factorization of integers (for example, RSA) or discrete logarithm (for example, El Gamal or elliptic curves) can be classified as quantum insecure. Table 6 Estimates of crypto-resistance of the most common cryptographic algorithms in the United States and NATO countries Required Required Key size, Effective Cryptoscheme number of number of Time estimate bits resistance, bits logical qubits physical qubits 128 128 2953 4,61*106 2,61*1012 years 7 AES 192 192 4449 1,68*10 1,97*1022 years 7 256 256 6681 3,36*10 2,29*1032 years 1024 80 2290 2,56*106 3,58 h RSA 2048 112 4338 6,2*106 28,63 h 4096 128 8434 1,47*107 229 h ECDLP 256 128 2330 3,21*106 10,5 h (NIST P-256, 356 192 3484 5,01*106 37,67 h NIST P-386, 512 256 4719 7,81*106 35 h NIST P-521) SHA-256 N/A 72 2403 2,23*106 1,8*104 years In addition, quantum computers pose a real threat to the security of most well-known blockchain platforms, which widely use asymmetric cryptographic algorithms to create a public-private key pair and an address, which is obtained using hash operations and a public key checksum. As a result, in some countries, mainly in the USA and the European Union, the transition to the use of stable quantum cryptography is already planned. For example, the aforementioned NIST is in the 19 process of developing quantum cryptography standards, and the NSA recommends its suppliers to implement SHA-384 instead of SHA-256. 4. Security Threat Model Considering the above, we propose the following model of information security threats to the critical information infrastructure (CII) of the Russian Federation [6, 21, 22, 34-36]. Some foreign countries are building up the potential of quantum technologies for carrying out information and technical impacts on the CII of the Russian Federation for military-political purposes. At the same time, there is an increase in the activities of foreign technical intelligence, using the capabilities of quantum cryptanalysis of asymmetric and symmetric encryption schemes based on quantum algorithms of Shor, Grover, Simon, and others to conduct technical intelligence about Russian government agencies, scientific organizations and enterprises of the military- industrial complex. Application of quantum technologies for military-political purposes, including for the implementation of actions contrary to international law, aimed at undermining the sovereignty, political and social stability, territorial integrity of the Russian Federation and its allies, and posing a threat to international peace, global and regional security. The growth of quantum crypto attacks on CII objects, the strengthening of the intelligence activities of foreign states about the Russian Federation, as well as the growing threats of the use of quantum technologies to damage the sovereignty, territorial integrity, political and social stability of the Russian Federation. An increase in the number of crypto attacks on blockchain platforms of leading financial institutions and organizations of the Russian Federation, using cryptographic algorithms to create a pair of public and private keys and an address, which is obtained using hashing operations and a public key checksum. In this case, disclosing only one address is not a big risk. However, disclosing the address and the public key used in the transaction is potentially dangerous, since, if there is sufficient progress in quantum computing, it will allow the private key to be obtained. Insufficient level of development of competitive domestic quantum technologies and their use for the production of products and services. The high degree of dependence of the domestic industry on foreign information technologies in terms of the electronic component base, software, computers, and communications, which determines the dependence of the socio-economic development of the Russian Federation on the geopolitical interests of foreign countries [21, 23, 24, 28]. Insufficient efficiency of scientific research in the field of quantum technologies aimed at creating promising quantum computers, low level of implementation of domestic developments, and insufficient staffing in the field of information security, as well as low awareness of citizens in matters of personal information security. Measures to ensure the security of information infrastructure, including its integrity, availability, and sustainable operation, using domestic information technologies and domestic products often do not have an integrated framework. The desire of individual states to use technological superiority in quantum technologies to dominate the information space. For the timely prevention of the listed security threats, in 2019 Russia adopted a "Roadmap for the development of quantum technologies" (hereinafter referred to as the Roadmap) [20]. Its main goal is to achieve, in the medium and long term, practically significant scientific, technical and practical results of the world level in some areas. Quantum computers and computing. Quantum computers and simulators are computing systems that use quantum phenomena to solve problems. Devices created based on quantum computing can many times exceed the capabilities of classical computers in solving problems of cryptanalysis, modeling complex systems, as well as machine learning and artificial intelligence. With the development of existing quantum computers, the emergence of the first applied results can be expected in the direction of accelerating machine learning problems and modeling new promising materials. The most promising platforms in the world are the following: superconducting chains, neutral atoms, and ions in traps. According to the QTRL classification, the development of 20 companies in the world at the moment corresponds to QTRL levels 4-5. That is, the problem of implementing quantum error correction codes has not yet been solved in the computational data systems of companies and practically significant algorithms cannot be fully implemented on them (including Shor's algorithm). To date, prototypes of quantum computers with 2 qubits (according to the roadmap for the development of quantum information processing technologies of the Advanced Research Foundation, 2–10 qubits) and quantum simulators with 10–20 qubits have been implemented in the Russian Federation. This corresponds to a QTRL level 3-4. Quantum communications. Technologies aimed at eliminating threats to information security, including from quantum computers, include using the properties of quantum systems to transfer keys. The main technology here is quantum key distribution (QKD). The main advantage of the QKD is the security of information guaranteed by the laws of physics. The global availability level is TRL 924 both in point-to-point solutions and in networks with a trusted node. QKD equipment for networks with untrusted nodes is at the laboratory testing level. Today, the level of readiness of domestic point-to-point solutions can be estimated as TRL 8, while in terms of quantum networks based on trusted nodes, domestic developments of quantum networks are far behind the level of China and the EU: TRL 6 versus TRL 9. Quantum sensors and metrology. Quantum sensors are high-precision measuring instruments based on quantum effects. It is expected that quantum sensors will have the high spatial and temporal resolution. This will improve the measurement accuracy in comparison with existing classical sensors. And the use of the properties of superposition, entanglement, and compression of quantum states, in turn, will provide in the long term the maximum possible measurement sensitivity by overcoming the standard quantum limit. The high degree of control over the state of individual microscopic systems, provided by quantum technologies, makes it possible to create quantum sensors with high sensitivity. The development of technologies for a variety of new generation sensors can give a powerful impetus in several areas at once: defense and security, navigation (space, unmanned vehicles), construction, mining and exploration, medical diagnostics/therapy, Industry 4.0, general assessment of the level of readiness of quantum technologies. sensors in the world (TRL 3–9) and in the Russian Federation (TRL 1–5). A prerequisite for a breakthrough in the field of quantum technologies is the support of research and the launch of infrastructure projects on a national scale. The total budget for the implementation of the Roadmap (for 2019-2024) amounted to 51.1 billion rubles, including extrabudgetary funding of 8.7 billion rubles. The main tasks of the Roadmap are: comprehensive support for breakthrough scientific and technological projects aimed at the development of quantum technologies; consolidation of the scientific and technological community in the framework of the creation of projects of national and global scale; the creation of an innovation ecosystem in Russia and the creation of conditions for the transition of quantum developments from laboratories to the industrial sector, as well as the formation of an appropriate business community; organization of cooperation between research departments and potential consumers of quantum technologies from key industries; development of human resources in the field of quantum technologies by introducing new types of educational programs at all levels; carrying out a set of organizational measures aimed at reducing bureaucratic friction. Note that the Roadmap is fully consistent with the "Strategy for Scientific and Technological Development of the Russian Federation (SSTD)", as well as the "Strategy for the Development of the Information Society of the Russian Federation (SDIO)". It is significant that the support of all three major sub-technologies of quantum technologies is critical for national security and ensuring the digital sovereignty of the Russian Federation. The role of quantum computing sub-technology is especially important for state security; the effects of its use are quite large. There is also a risk of restricting access to products from foreign manufacturers in this area. 21 And from the point of view of technological maturity, the closest to entering the market is the technology of quantum communications. The Roadmap emphasizes that in this area of Russia it is required to have its technical solutions with the maximum degree of localization of production (both end devices and components) to eliminate the risk of introducing destructive hardware and software (undeclared capabilities, NDV) into hardware and software, and, as a consequence, access to protected information. 5. Conclusion Some Western states, primarily the United States and its NATO allies, seek to use technological superiority in the field of artificial intelligence (AI), quantum technologies (Q), collection and processing of big data (Big Data + ETL), high and ultra-high performance to dominate the information space. At the same time, the growing concern is caused by the desire of these states to use information technologies for military-political purposes, including for the implementation of actions aimed at undermining the sovereignty, political and social stability, and the territorial integrity of the Russian Federation. The US National Quantum Initiative (2018) aims to maintain technological leadership in the field of quantum technologies in the medium and long term. For this, starting in 2019, a series of (more than 80) dual-use R&D projects have been launched under the control of the NSA, IERPA, DARPA, NFS, the US Department of Energy, etc. The US Department of Defense approved and is implementing the Plan for Advanced Research and Development on Quantum Technologies for the period 2019-2024 in some areas, including the development of promising models and methods for collecting and processing big data based on quantum technologies, artificial intelligence methods, and machine learning, quantum algorithms for solving military-technical problems of analysis and synthesis (including cryptanalysis problems), creating trusted quantum communication systems, models and methods of quantum cryptography. The total US budget for the development of quantum technologies in 2021 exceeded $ 2.5 billion. To prevent possible security threats, in 2019 Russia adopted a Roadmap for the development of quantum technologies. The total budget for its implementation (for 2019-2024) amounted to 51.1 billion rubles. ($ 691 million). The main goal of the Roadmap is to achieve, in the medium and long term, practically significant scientific, technical and practical world-class results in the following areas: quantum computers and computing, quantum communications, quantum sensors, and metrology, quantum and post-quantum cryptography. At the same time, in quantum cryptography, a special place is given to the effective solution of quantum cryptanalysis problems based on the promising quantum algorithms of Shor, Grover, Simon, etc. Thus, Shor's algorithm provides an exponential acceleration of the solution of factorization problems, discrete logarithm (DLP), and discrete logarithm with an elliptic curve (ECDLP ). The mentioned tasks are widely used in cryptographic applications TLS, SSH or IPSec of Internet / Intranet and IIoT / IoT networks, communication protocols based on Diffie-Hellman key agreements (depending on DLP or ECDLP strength), in digital signature algorithms (DSA, ECDSA, RSA-PSS ), public key encryption algorithms (El Gamal, RSA-OAEP), etc. In other words, Shor's quantum algorithm is capable of breaking the listed algorithms, and with them all public-key cryptography mechanisms deployed in cyberspace. 6. Acknowledgments The article was prepared based on the results of research carried out with the support of the RFBR grant (No. 20-04-60080). 7. References [1] D. V. Denisenko, G. B. Marshalko, M. V. Nikitenkova, V. I. Rudskoj, V. A. Shishkin, Ocenka slozhnosti realizacii algoritma Grovera dlya perebora klyuchej algoritmov blochnogo shifrovaniya GOST R 34.12-2015 [Estimation of the complexity of the Grover algorithm implementation for 22 enumerating keys of block cipher algorithms GOST R 34.12-2015], Zhurnal e`ksperimental`noj i teoreticheskoj Fiziki [Journal of Experimental and Theoretical Physics], Kapitza Institute for Physical Problems, RAS, Moscow, 2019, volume 155, 4, pp. 645–653. doi: 10.1134/S0044451019040072. [2] A.V. Korol`kov, O nekotory`x prikladny`x aspektax kvantovoj kriptografii v kontekste razvitiya kvantovy`x vy`chislenij i poyavleniya kvantovy`x komp`yuterov [A.V. Korolkov On some applied aspects of quantum cryptography in the context of the development of quantum computing and the emergence of quantum computers], Voprosy` kiberbezopasnosti [Issues of Cybersecurity], Moscow, 2015, 1(9), pp. 6 - 13. URL: https://cyberrus.com/wp- content/uploads/2015/05/vkb_09_02.pdf. [3] P. G. Klyucharev, Algoritmicheskoe i programmnoe obespechenie dlya modelirovaniya kvantovogo komp`yutera [Algorithmic and software for modeling a quantum computer], Avtoreferat dissertacii na soiskanie uchenoj stepeni kandidata texnicheskix nauk [Abstract of dissertation for the degree of candidate of technical sciences], Bauman Moscow State Technical University, Moscow, 2009, 18 pages. [4] E. A. Matveev, Primenenie kvantovomexanicheskix e`ffektov v sistemax zashhity` informacii [Application of quantum-mechanical effects in information security systems], Dissertaciya na soiskanie kandidata fiziko-matematicheskix nauk [Dissertation for a candidate of physical and mathematical sciences], Scientific and technical enterprise "Cryptosoft", Penza, 2019, 157 pages. [5] A. A. Moldovyan, N. A. Moldovyan, Novy`e formy` zadaniya skry`toj zadachi diskretnogo logarifmirovaniya [New forms of specifying the hidden discrete logarithm problem], Trudy` SPIIRAN [Proceedings of SPIIRAS], St. Petersburg, 2019, 18(2), pp. 504-529. doi:10.15622/sp.18.2.504-529. [6] A. S. Petrenko, A. M. Romanchenko, Perspektivny`j metod kriptoanaliza na osnove algoritma Shora [A promising method of cryptanalysis based on the shore algorithm], Zashhita informacii. Inside, Izdatel`stvo Afina [Information security. Inside, Athena Publishing House], St. Petersburg, 2020, 2, pp. 17-23. [7] P. A. Pravil`shhikov, Kvantovy`j parallelizm i reshenie uravnenij v zadachax upravleniya na baze novoj modeli vy`chislenij [Quantum Parallelism and Solution of Equations in Control Problems Based on a New Computation Model], Institut problem upravleniya im. V.A. Trapeznikova RAN [V.A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences], Moscow, 2014, pp. 7335-7351. URL: https://www.elibrary.ru/item.asp?id=22231427. [8] A. S. Xolevo, Matematicheskie osnovy` kvantovoj informatiki [Mathematical Foundations of Quantum Informatics], Lekcionny`e kursy` Nauchno-obrazovatel`nogo centra, Matematicheskij institut im. V.A. Steklova Rossijskoj akademii nauk [Lecture Courses of the Scientific and Educational Center, Steklov Mathematical Institute of Russian Academy of Sciences], Moscow, 2018, 30, pp. 3-117. URL: https://doi.org/10.4213/lkn30. [9] A. V. Cheremushkin, Kriptograficheskie protokoly`: osnovny`e svojstva i uyazvimosti [Cryptographic Protocols: Basic Properties and Vulnerabilities], Prikladnaya diskretnaya matematika, Institut kriptografii, svyazi i informatiki [Applied Discrete Mathematics, Institute of Cryptography, Communications and Informatics], Moscow, 2009, appendix to No. 2, pp. 115–150. URL: http://mi.mathnet.ru/pdm141. [10] Klod E`. Shennon, Raboty` po teorii informacii i kibernetike, Perevod s angl., S predisloviem A. N. Kolmogorova; Pod redakciej R. L. Dobrushina i O. B. Lupanova [Claude E. Shannon, Works on Information Theory and Cybernetics, Translated from English, with a foreword by A. N. Kolmogorov; Edited by R. L. Dobrushin and O. B. Lupanov], Izdatel`stvo inostrannoj literatury` [Foreign Literature Publishing House], Moscow, 1963, 829 pages. [11] P. Shor, Algorithms for quantum computation: discrete logarithms and factoring, Foundations of Computer Science, 1994, 10, 134 pages. [12] D. Deutsch, Quantum theory, the Church-Turing principle and the universal quantum computer, Proceedings of the Royal Society A, 1985, 400 (1818), pp. 97-117. [13] D. Deutsch, R. Jozsa, Rapid solution of problems by quantum computation, Proceedings of the Royal Society of London A, 1992, 439 (1907), pp. 553-558. [14] D. Diffie, M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 1976, volume 22, issue 6. 23 [15] R. Feynman, Simulating physics with computers, Internat. J. Theoret. Phys., 1982, 21, pp. 467 - 488. [16] L. K. Grover, A fast quantum mechanical algorithm for database search, In Proceedings of the twenty-eighth, annual ACM symposium on Theory of computing, ACM, 1996, pp. 212 – 219. [17] P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Computing, 1997, 26, pp. 1484 – 1509. [18] D. R. Simon, On the power of quantum computation, SFCS '94: Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994, 116 – 123. [19] S. P. Jordan, Y. Liu, Quantum Cryptanalysis: Shor, Grover, and Beyond, IEEE Security & Privacy, 2018, volume 16, 5, pp. 14-21. doi: 10.1109/MSP.2018.3761719. [20] Dorozhnaya karta razvitiya «skvoznoj» cifrovoj texnologii «Kvantovy`e texnologii» [Roadmap for the development of "end-to-end" digital technology "Quantum technologies"], Ministerstvo cifrovogo razvitiya, svyazi i massovy`x kommunikacij Rossijskoj Federacii [Ministry of Digital Development, Communications and Mass Media of the Russian Federation], Moscow, 2019, 26 pages. URL: https://digital.gov.ru/ru/documents/6650. [21] A. A. Petrenko, S. A. Petrenko, K. A. Makoveichuk, A. V. Olifirov, Methodological recommendations for the cyber risks management, CEUR Workshop Proceedings, volume 2914, (2021), pp. 234-247. URL: http://ceur-ws.org/Vol-2914/paper20.pdf. [22] A. S. Petrenko, S. A. Petrenko, K. A. Makoveichuk, P. V. Chetyrbok, Protection model of PCS of subway from attacks type «wanna cry», «petya» and «bad rabbit» IoT, Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018-January, pp. 945-949. doi: 10.1109/EIConRus.2018.8317245. [23] A. V. Barabanov, A. S. Markov, V. L. Tsirlov, Methodological framework for analysis and synthesis of a set of secure software development controls, Journal of Theoretical and Applied Information Technology, volume 88(1) (2016), pp. 77-88. URL: http://www.jatit.org/volumes/Vol88No1/9Vol88No1.pdf. [24] A. V. Barabanov, A. S. Markov, V. L. Tsirlov, Statistics of software vulnerability detection in certification testing, Journal of Physics: Conference Series, volume 1015(4) (2018) 042033. doi: 10.1088/1742-6596/1015/4/042033. [25] C. Wang, H.-N. Yao, B.-N. Wang, F. Hu, X.-M. Ji, H.-G. Zhang, Progress in Quantum Computing Cryptography Attacks, Jisuanji Xuebao, 2020, volume 43, 9, pp. 1691 - 1707. doi: 10.11897/SP.J.1016.2020.01691. [26] D. Denisenko, Quantum Differential Cryptanalysis. Journal of Computer Virology and Hacking Techniques, 2021. doi: 10.1007/s11416-021-00395-x [27] G. Khalimov, S. Khalimova, Y. Kotukh, Encryption Scheme Based on the Automorphism Group of the Ree Function Field, 7th International Conference on Internet of Things: Systems, Management, and Security, 2020, volume 7. doi: 10.1109/IOTSMS52051.2020.9340192 [28] H. Krachunov, T. G. Sheremet, Parameters for estimate the digital national economy in the EAEU Member Countries. CEUR Workshop Proceedings, volume 2834 (2021), pp. 219-230. URL: http://ceur-ws.org/Vol-2834/Paper19.pdf. [29] I. Gorbenko, V. Ponomar, Examining a Possibility to Use and the Benefits of Post-Quantum Algorithms Dependent on the Conditions of Their Application, Eastern-European Journal of Enterprise Technologies, 2017, volume 2, 9(86), pp. 21 - 32. doi: 10.15587/1729- 4061.2017.96321. [30] J. Bobrysheva, S. Zapechnikov, Post-Quantum Security of Messaging Protocols: Analysis of Double Ratcheting Algorithm, Proceedings of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, 2020, pp. 2041-2044. doi: 10.1109/EIConRus49466.2020.9039075. [31] M. Lutsenko, A. Kuznetsov, A. Kiian, T. Kuznetsova, O. Smirnov, Biometric Cryptosystems: Overview, State-Of-The-Art and Perspective Directions, Lecture Notes in Networks and Systems, 2021, volume 152, pp. 66-84. doi: 10.1007/978-3-030-58359-0_5. [32] N. Abdinurova, B. Kynabay, Revealing Encryption Algorithm for Integrating with Quantum Technologies by Using Cryptanalysis, 14th International Conference on Electronics Computer and Computation, 2019, volume 14. doi: 10.1109/ICECCO.2018.8634689. 24 [33] Ovcharova, S., Krachunov, H. Innovation activities in entrepreneurial firms: The case of Bulgaria. Entrepreneurship in the Balkans: Diversity, Support and Prospects, 2013, pp. 37-55. DOI: 10.1007/978-3-642-36577-5_3. [34] S. A. Petrenko, A. A. Petrenko, K. A. Makoveichuk, A. V. Olifirov, Development of a Cyber- Resistant Platform for the Internet of Things Based on Dynamic Control Technology. In: Singh P.K., Veselov G., Vyatkin V., Pljonkin A., Dodero J.M., Kumar Y. (eds) Futuristic Trends in Network and Communication Technologies. FTNCT 2020. Communications in Computer and Information Science, volume 1395 (2021), pp. 144-154. Springer, Singapore. URL: https://doi.org/10.1007/978-981-16-1480-4_13. [35] S. A. Petrenko, K. A. Makoveichuk, A. V. Olifirov, Concept of cyber immunity of industry 4.0, CEUR Workshop Proceedings, volume 2603, (2019), pp. 93-99. URL: http://ceur-ws.org/Vol- 2603/paper20.pdf. [36] S. A. Petrenko, K. A. Makoveichuk, A. V. Olifirov, New Methods of the Cybersecurity Knowledge Management Analytics. In: Sukhomlin V., Zubareva E. (eds) Convergent Cognitive Information Technologies. Convergent 2018. Communications in Computer and Information Science, volume 1140 (2020), pp. 296-310. Springer, Cham. URL: https://doi.org/10.1007/978-3-030-37436-5_27. 25