Security assessment of cryptographic solutions
The objective of evaluating cryptographic solutions is to build a risk model of the application assets and the application itself when faced with the threat of a quantum computer. A fundamental problem for existing solutions consists in using asymmetric encryption algorithms and obtaining secret keys. These algorithms are vulnerable for a quantum computer because it is able to effectively solve their underlying mathematical problems which cannot be solved by classical computers within the foreseeable time frame.
Objectives of the assessment
Analysis of the current product, search for vulnerabilities caused by the incorrect implementation of existing cryptographic algorithms, and integration of third-party solutions.
    Analysis of threats posed by a quantum computer to the used algorithms and assets.
      Report preparation based on the results of the analysis, including recommendations on the problems found in the current implementation.
      Support of the project and provision of technical and scientific expertise.
      Assessment result
      Based on the results of the assessment, the team provides the client with a report that reflects the details of the technical work, the project goals, a description of the product and its architecture, as well as problems and vulnerabilities and recommendations for their correction. The client may request clarification in the final report regarding the information provided and ask for additional iterations of reviewing the document and making corrections to it.
      Project architecture review
      Listing of assets and methods of their protection
      Cryptographic algorithms and materials included in the project
      General remarks on the protection mechanisms included in the project
      Project functionality description
      List of vulnerabilities
      The attacker's model and its scenarios
      Evaluation of the provided results by time
      Provided and used materials
      Related services and products