Abstract
Recent developments in technology suggest that within the next one to two decades some form(s) of quantum computing device will become viable. Once such devices become generally available they will doubtless be employed by cyber-criminals to perform brute-force decryption tasks that were previously infeasible. This paper attempts to address the question of how digital forensic investigation techniques will need to develop in order to respond to the challenges posed by such future generation computing devices.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Reich, E.S.: Quantum Computers Move a Step Closer. Nature 467, 513 (2010)
Shor, P.W.: Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In: Proc. 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE Press, Los Alamitos (1994); quant-ph/9508027
Shor, P.W.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. 26, 1484–1509 (1997)
Grover, L.K.: A Fast Quantum Mechanical Algorithm for Database Search. In: Proc. 28th Annual ACM Symposium on the Theory of Computing, pp. 212–219 (May 1996); quant-ph/9605043
Grover, L.K.: Quantum Mechanics helps in Searching for a Needle in a Haystack. Phys. Rev. Letters 79, 325–328 (1997)
Mermin, N.D.: Quantum Computer Science: an Introduction. Cambridge University Press, Cambridge (2007)
Overill, R.E.: Parallelism of Paradigms in Non-Classical Computation. In: Stepney, S. (ed.) Proc. Intl. Workshop: The Grand Challenge in Non-Classical Computation, York, UK (April 2005)
Wootters, W.K., Zurek, W.H.: A Single Quantum Cannot be Cloned. Nature 299, 802–803 (1982)
Dieks, D.: Communication by EPR devices. Physics Letters A 92(6), 271–272 (1982)
Konstadopoulou, A.: From Quantum Security to Quantum Forensics. In: Proc. 1st Conference on Advances in Computer Security and Forensics (ACSF), Liverpool, UK, pp. 105–111 (July 2006)
Kwan, M., Chow, K.-P., Law, F., Lai, P.: Reasoning about Evidence using Bayesian Networks. In: Proc. 4th Annual IFIP WG 11.9 International Conference on Digital Forensics, Kyoto, Japan (January 2008); Advances in Digital Forensics IV, ch. 12, pp. 141–155. Springer, Heidelberg (2008)
Kwan, Y.K., Overill, R.E., Chow, K.-P., Silomon, J.A.M., Tse, H., Law, Y.W., Lai, K.Y.: Evaluation of Evidence in Internet Auction Fraud Investigations. In: Proc. 6th Annual IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong (January 2010); Advances in Digital Forensics VI, ch. 7, pp. 95–106. Springer, Heidelberg (2010)
Papadimitriou, C.H.: Computational Complexity. Addison-Wesley, Reading (1994)
Kieras, D.: Using the Keystroke-Level Model to Estimate Execution Times, University of Michigan (2001), http://www.cs.loyola.edu/~lawrie/CS774/S06/homework/klm.pdf
Overill, R.E., Silomon, J.A.M., Chow, K.-P.: A Complexity Based Model for Quantifying Forensic Evidential Probabilities. In: Proc. 3rd International Workshop on Digital Forensics (WSDF 2010), Krakow, Poland, pp. 671–676 (February 2010)
Overill, R.E., Silomon, J.A.M.: Digital Meta-Forensics: Quantifying the Investigation. In: Proc. 4th International Conference on Cybercrime Forensics Education & Training (CFET 2010), Canterbury, UK (September 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Overill, R.E. (2011). Digital Quantum Forensics: Challenges and Responses. In: Park, J.J., Yang, L.T., Lee, C. (eds) Future Information Technology. Communications in Computer and Information Science, vol 185. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22309-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-22309-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22308-2
Online ISBN: 978-3-642-22309-9
eBook Packages: Computer ScienceComputer Science (R0)