Workshop Description
Digital evidence depends on cryptographic authentication at every stage. Forensic disk images are hash-verified and digitally signed. Chain of custody logs use timestamped signatures. Court submissions rely on qualified electronic signatures under eIDAS. All of these mechanisms use RSA or ECDSA, both of which Shor's algorithm breaks on a sufficiently capable quantum computer. The consequence is that evidence authenticated today may face admissibility challenges in future proceedings if an adversary can demonstrate the ability to forge the signatures that validated it.
This is not a theoretical concern for evidence with long legal significance. Criminal appeals, civil claims with extended limitation periods, and regulatory investigations can revisit evidence years or decades after collection. If the cryptographic signatures on that evidence can be retroactively forged, defence counsel will challenge its integrity. This workshop maps the specific cryptographic dependencies in forensic evidence workflows, assesses the timeline for quantum capability against evidence retention periods, and provides practical guidance on transitioning to quantum-resistant evidence authentication. It also gives an honest assessment of quantum-enhanced forensic analysis: Grover's algorithm offers quadratic speedup for search but not the transformative capability sometimes claimed.
What participants cover
- Quantum threats to digital signatures on forensic images, chain of custody logs, and court submissions
- RFC 3161 timestamp authority vulnerability: how quantum capability undermines timestamped evidence
- eIDAS Regulation qualified electronic signatures: the quantum vulnerability timeline for EU electronic evidence
- Forensic imaging standards (ISO 27037, ACPO): which hash algorithms survive quantum attack and which signing algorithms do not
- Expert witness preparation: how defence counsel will argue quantum-era signature unreliability
- Honest assessment of quantum-enhanced forensics: Grover quadratic speedup versus fault-tolerant requirements for practical forensic analysis