Supporting PQC migration and cryptographic agility with automated CBOM generation

The technological development of quantum computers has advanced dramatically in recent years as organizations and governments seek to take advantage of the increasing computing power of quantum computers. Although quantum computers have the potential to benefit people and economies in many areas, th...

Full description

Bibliographic Details
Main Author: Leirimaa, Kristian
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, University of Jyväskylä, Jyväskylän yliopisto
Format: Master's thesis
Language:eng
Published: 2024
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/98042
_version_ 1826225716059963392
author Leirimaa, Kristian
author2 Informaatioteknologian tiedekunta Faculty of Information Technology University of Jyväskylä Jyväskylän yliopisto
author_facet Leirimaa, Kristian Informaatioteknologian tiedekunta Faculty of Information Technology University of Jyväskylä Jyväskylän yliopisto Leirimaa, Kristian Informaatioteknologian tiedekunta Faculty of Information Technology University of Jyväskylä Jyväskylän yliopisto
author_sort Leirimaa, Kristian
datasource_str_mv jyx
description The technological development of quantum computers has advanced dramatically in recent years as organizations and governments seek to take advantage of the increasing computing power of quantum computers. Although quantum computers have the potential to benefit people and economies in many areas, they also threaten the security of modern cryptography, especially the widely used public key cryptography such as RSA, DH, ECC, and DSA. Since these algorithms will be completely broken in the future, quantum-safe alternatives are being developed and researched to mitigate the threat. History has shown that replacing cryptographic algorithms is a long and difficult process, and given the complexity of modern information systems, automated tools are needed to support post-quantum cryptography migration and cryptographic agility. In this research, an automated Cryptography Bill of Materials (CBOM) generator was built as a solution to this need and it's feasibility was analyzed. Design science principles were used to guide the research process, as well as the building and evaluation of the created artifact. The main result of the research is an artifact capable of generating CBOMs by scanning cryptographic algorithms from JavaScript source files that implement the Node.js Crypto module. In addition, the research proved that an automated CBOM tool based on regular expression searches is a feasible and accurate solution for capturing cryptographic components.
first_indexed 2024-11-02T21:00:29Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "P\u00f6l\u00f6nen, Ilkka", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Leirimaa, Kristian", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-11-01T17:03:19Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-11-01T17:03:19Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/98042", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The technological development of quantum computers has advanced dramatically in recent years as organizations and governments seek to take advantage of the increasing computing power of quantum computers. Although quantum computers have the potential to benefit people and economies in many areas, they also threaten the security of modern cryptography, especially the widely used public key cryptography such as RSA, DH, ECC, and DSA. Since these algorithms will be completely broken in the future, quantum-safe alternatives are being developed and researched to mitigate the threat. History has shown that replacing cryptographic algorithms is a long and difficult process, and given the complexity of modern information systems, automated tools are needed to support post-quantum cryptography migration and cryptographic agility. In this research, an automated Cryptography Bill of Materials (CBOM) generator was built as a solution to this need and it's feasibility was analyzed. Design science principles were used to guide the research process, as well as the building and evaluation of the created artifact. The main result of the research is an artifact capable of generating CBOMs by scanning cryptographic algorithms from JavaScript source files that implement the Node.js Crypto module. In addition, the research proved that an automated CBOM tool based on regular expression searches is a feasible and accurate solution for capturing cryptographic components.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2024-11-01T17:03:19Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-11-01T17:03:19Z (GMT). No. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "105", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "CC BY 4.0", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.title", "value": "Supporting PQC migration and cryptographic agility with automated CBOM generation", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202411016889", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Specialisation in Software Development", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Ohjelmistokehityksen opintosuunta", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.copyright", "value": "\u00a9 The Author(s)", "language": null, "element": "rights", "qualifier": "copyright", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://creativecommons.org/licenses/by/4.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_98042
language eng
last_indexed 2025-02-18T10:55:50Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/1447c166-fe6a-4ad1-be6d-ea2864a23cf1\/download","text":"URN:NBN:fi:jyu-202411016889.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Leirimaa, Kristian Supporting PQC migration and cryptographic agility with automated CBOM generation Specialisation in Software Development Ohjelmistokehityksen opintosuunta
title Supporting PQC migration and cryptographic agility with automated CBOM generation
title_full Supporting PQC migration and cryptographic agility with automated CBOM generation
title_fullStr Supporting PQC migration and cryptographic agility with automated CBOM generation Supporting PQC migration and cryptographic agility with automated CBOM generation
title_full_unstemmed Supporting PQC migration and cryptographic agility with automated CBOM generation Supporting PQC migration and cryptographic agility with automated CBOM generation
title_short Supporting PQC migration and cryptographic agility with automated CBOM generation
title_sort supporting pqc migration and cryptographic agility with automated cbom generation
title_txtP Supporting PQC migration and cryptographic agility with automated CBOM generation
topic Specialisation in Software Development Ohjelmistokehityksen opintosuunta
topic_facet Ohjelmistokehityksen opintosuunta Specialisation in Software Development
url https://jyx.jyu.fi/handle/123456789/98042 http://www.urn.fi/URN:NBN:fi:jyu-202411016889
work_keys_str_mv AT leirimaakristian supportingpqcmigrationandcryptographicagilitywithautomatedcbomgeneration