**10. Conclusion**

Overlay security combined with distributed trust forms an immediate quantumsafe alternative to the public key infrastructure. The existing technologies enable (1) the use of multi-logical/multi-physical channels to create a random secret at will, (2) use of the blockchain distributed ledger as a replacement for single point of failure trusted authority, and to (3) produce quantum-safe signatures.

The suggested changes can gradually, seamlessly, and smoothly emerge over the existing infrastructure without the need to restructure any component of the Internet.

### **Author details**

Shlomi Dolev Ben-Gurion University of the Negev & Secret Double Octopus Ltd, Israel

\*Address all correspondence to: dolev@cs.bgu.ac.il

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**83**

*Overlay Security: Quantum-Safe Communication over the Internet Infrastructure*

[9] Diffie W, Hellman ME. New directions in cryptography. IEEE Transactions on Information Theory.

[10] Dolev S, Panwar N, Segal M. Certificating vehicle public key with vehicle attributes. 2014. US

[11] D-wave the quantum computing company. Available from: https://www. dwavesys.com/d-wave-two-system

Lvovsky AI. Quantum computers put blockchain security at risk. Nature.

[14] Gheorghiu V, Gorbunov S, Mosca M, Munson M. Quantum Proofing the Blockchain. Blockchain Research Institute: University of Waterloo; 2017

[15] Google Tests Post-Quantum Crypto Quantum Computing Will Shred Current Crypto Systems, Experts Warn Jeremy Kirk • July 11, 2016. Available from: https://www.bankinfosecurity.com/ google-adds-quantum-computing-

ai.googleblog.com/2018/03/a-previewof-bristlecone-googles-new.html

[12] Fedorov AK, Kiktenko E,

[13] Grover LK. A fast quantum mechanical algorithm for database search. In: STOC. 1996. pp. 212-219

2018;**7732**(465):563-663

armor-to-chrome-a-9253

2017;**89**(1):015004

[16] Available from: https://

[17] Herrero-Collantes M, Garcia-Escartin JC. Quantum random number generators. Reviews of Modern Physics.

[18] IBM Raises the Bar with a 50-Qubit Quantum Computer. MIT technology review. Available from: https://www.technologyreview. com/s/609451/ibm-raises-the-barwith-a-50-qubit-quantum-computer

1976;**22**(6):644-654

US9769658B2

*DOI: http://dx.doi.org/10.5772/intechopen.86179*

[1] Adrian D, Bhargavan K, Durumeric Z, Pierrick G, Green M, Halderman JA, et al. Imperfect forward secrecy: How Diffie-Hellman fails in practice. In: CCS'15. 2015

[2] Agrawal M, Kayal N, Saxena N. PRIMES is in P. Annals of Mathematics.

[3] Bennett CH, Brassard G. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. Vol. 175.

[4] Bernstein JB, Heninger N, Lou P, Valenta L. Post-Quantum RSA. International Workshop on Post-Quantum Cryptography. 2017.

pp. 311-329. A Preview of Bristlecone, Google's New Quantum Processor. Available from: https://ai.googleblog. com/2018/03/a-preview-of-bristlecone-

Requirements Knowledge, International Workshop on (AFIPS). Vol. 48. 1979.

[6] Canada's New Partnership with Estonia is a Major Digital Government Milestone 28/5/18 Max Greenwood More can be found here at Techvibs: https:// techvibes.com/2018/05/29/canadas-newpartnership-with-estonia-is-a-majordigital-government-milestone

[7] News article, the real security issue behind the Comodo hack. CSO from IDG By Roger A. Grimes. Available from: https://www.csoonline.com/ article/2623707/hacking/the-real-securityissue-behind-the-comodo-hack.html

[8] Center for quantum computation & communication technology, Australian research council center of excellence. Available from: http://www.cqc2t.org

2004;**160**(2):781-793

New York; 1984. p. 8

googles-new.html

pp. 313-317

[5] Blakley GR. Safeguarding cryptographic key. In: Managing

**References**

*Overlay Security: Quantum-Safe Communication over the Internet Infrastructure DOI: http://dx.doi.org/10.5772/intechopen.86179*
