Quantum resistant Cryptography (Entrust Guide)

 

While still in their early stages of development, quantum computers are set to change the world — and that includes the ability to break the cryptography and encryption we use today. Quantum computers are approaching the computing power and stability needed to break public-key encryption protocols. The time to migrate to post-quantum cryptography is now.

What is a Quantum Computer?

Quantum computers apply the properties of quantum mechanics to processing power. This allows them to perform highly complex computations significantly faster than classical computers.

Before you can understand quantum computing, you must first wrap your mind around the “qubit.” In traditional computing, the basic unit of memory is a “bit,” which represents either a one or zero. On the other hand, a qubit can represent one, zero, or even a combination of them both at the same time — a phenomenon referred to as “superposition.”

When classical computers try to solve a problem with multiple variables, they must perform a new calculation whenever a variable changes. As a deterministic solution, each calculation is a single path to a single result. Quantum computers aren’t limited to one algorithm and can explore numerous pathways simultaneously.

In short, this ability means quantum computing is exponentially faster than the capabilities we have now.

Why is Quantum Computing Important?

Quantum computing has ushered in a major change for society – impacting everything from automotive to chemistry, biology, and physics. With unprecedented processing power, next-generation computers will have a tangible impact across several key industries:

  • Automotive: Quantum computers could be applied to the manufacturing process, decreasing costs and shortening cycle times by optimizing productivity.
  • Finance: Down the road, financial institutions will be able to leverage quantum technology for advanced portfolio and risk management.
  • Artificial intelligence: Combining quantum computing with an AI and deep learning algorithm can greatly expedite data analysis, reduce training times, and optimize supply chain operations.
  • Pharmaceuticals: Quantum computers have the potential to rapidly accelerate research and development. Moreover, they may reduce the reliance on trial and error to greatly improve R&D efficiency.

Why Are Quantum Computers a Potential Security Risk?

Today’s cryptographic systems provide more than enough protection against even the most persistent cybersecurity threats. However, none are safe from quantum attacks.

Luckily, there’s still no such thing as a cryptographically relevant quantum computer because there isn’t one sophisticated enough to crack public key encryption. However, cybercriminals are already harvesting information in anticipation of whenever that day arrives — a strategy known as “harvest now, decrypt later.”

Organizations with an abundance of data with long-standing value (typically 25 years) are particularly susceptible to the quantum threat. For example, critical infrastructures such as finance, healthcare, and government have already started transitioning to a quantum-safe security posture.

Identify Keys at Risk

Many standard cryptographic schemes are vulnerable to quantum attacks. These include:

  • Advanced Encryption Standard (AES) 256: Larger output needed
  • Secure Hash Algorithm (SHA) 256 and SHA-3: Larger output needed
  • Rivest-Shamir-Adelman (RSA encryption): No longer secure
  • Elliptic Curve Cryptography (ECDSA and ECDH): No longer secure
  • Digital Signature Algorithm (DSA): No longer secure

Take steps to secure your organization’s data — today and in the future — by migrating to post-quantum encryption. The process can take years and the National Institute of Standards and Technology (NIST) is actively working to establish new protocols.

Entrust is a participating member of the Internet Engineering Task Force (IETF) and participates with NIST to identify new quantum-resistant cryptography standards for the post-quantum world. It’s critical to begin planning to replace hardware, software, and services that use public-key algorithms now so that information is protected from the future quantum threat.

When Will Quantum Computers Arrive?

Quantum computers have largely been relegated to national labs and universities, but several brands are entering the race to create commercially available quantum computers, including IBM, Microsoft, Google, AWS, and Honeywell. While the technology is being developed, it stands to advance quickly. And widespread availability of quantum computers could increase the potential risk of public-key encryption.

According to McKinsey, the major players in quantum computer production, as well as a small cohort of start-ups, will soon increase the number of qubits their innovations can handle. By 2030, 5,000 quantum computers will be operational. However, organizations won’t have to wait long before they begin experiencing post-quantum security threats. The Global Risk Institute predicts that quantum computers will crack current cybersecurity mechanisms sometime between 2027 and 2030.

What is Post-Quantum Cryptography?

The good news is that breakthroughs in quantum safe cryptography have the potential to mitigate the impending threat to public key encryption.

As defined by Caltech, post-quantum cryptography (PQC) aims to create encryption methods that cannot be broken by a quantum algorithm. It uses the laws of quantum physics to transmit private data in an undetectable manner. This process is known as quantum key distribution.

A PQC algorithm compares measurements taken at both ends of a transmission, thereby allowing you to know if the key has been compromised.

What Is Cryptographic Agility?

Crypto agility, or cryptographic agility, is the ability to change, approve, and revoke cryptographic assets as needed to respond to developing threats.

Crypto agility gives you the ability to change cryptographic algorithms, combine encryption methods, increase encryption key sizes, and revoke digital certificates — all without significant security and IT lift. This makes it an important stepping stone for any organization on its path to post-quantum security.

There are a few simple steps enterprises can take to assess their crypto agility maturity.

  1. First, identify the algorithm, data protection risks, and post-quantum challenges in your business operations. Does your organization use any cryptographic keys that are currently considered at risk?
  2. Next, map out your migration plan and establish timeframes for achieving certain milestones. A successful migration can take years, so be sure to take a phased approach rather than biting off more than you can chew.
  3. Lastly, review your governance against best practices for control, compliance, and skills in readiness for post-quantum migration testing and implementation.

Once you know what data is at risk, you can develop a detailed plan to mitigate potential threats. Or, use Entrust’s Cryptographic Center of Excellence for actionable recommendations to remediate identified risks in cryptosystems.

How Do You Prepare For Post-Quantum Security?

Achieving quantum readiness isn’t an easy task. Fortunately, there are four steps you can take today to ensure your journey starts on the right track:

  1. Take inventory of your cryptographic assets and data and where they reside.
  2. Prioritize your most valuable assets and those with the longest shelf life. Migrate this data to post-quantum encryption first.
  3. Test quantum-resistant algorithms on a prototype data set before the real deal.
  4. Plan a roadmap for migrating to PQC algorithms with your vendors.

Entrust: An Expert Partner for Post-Quantum Cryptography

Your organization doesn’t need to plan for post-quantum encryption all on its own. Entrust’s Cryptographic Center of Excellence (CryptoCoE) provides the tools and guidance needed to inventory and prioritize your data and cryptographic assets while putting a post-quantum plan into motion.

Ready to start the journey? Learn more about Entrust’s post-quantum solutions today.

-------------------------------------------------------------------------------------------------------------------------------------------

Quantum computing is advancing, and while experts are not sure when there will be a quantum computer powerful enough to break the RSA and ECC cryptographic algorithms that are currently in use, many are operating under the assumption that this can happen within a 10- to 15-year timeframe. This is a general timeline because there is no way to know when this will occur – it could happen sooner, or it could happen later.

Luckily, there’s still time to act and plenty you can do to safeguard your organization. Read to learn more about:

  • The purpose of post-quantum cryptography (PQC)
  • When the first quantum attack might strike
  • Resources for understanding quantum resistant cryptography
  • Regulations and standards for the post-quantum (PQ) world
  • How Entrust solutions can help prepare you for the quantum threat

What is the Purpose of Post-Quantum Cryptography?

Knowing the basics of quantum computing is essential to understanding PQC algorithms and their importance to enterprise cybersecurity.

Whereas a classical computer operates on binary code — meaning zeroes and ones — quantum computers encode data into qubits. A qubit is a superposition of all points in between, allowing it to represent either a zero, one, or a linear combination of the two. In simple terms, applying quantum mechanics to computing allows a quantum computer to perform calculations much faster than a traditional one.

This has the potential to greatly benefit many industries, including healthcare, finance, and more. However, it’s also a major threat to public key infrastructure (PKI). With its ability to calculate at lightning speed, quantum computers will be able to crack today’s standard encryption methods, which are widely used to protect sensitive data and safeguard against theft, fraud, and exploitation.

Post-Quantum Cryptography

Otherwise known as quantum resistant cryptography, PQC aims to develop new cryptographic systems that can protect against an eventual quantum attack. In essence, PQC algorithms rely on mathematical equations — such as lattice-based or multivariate cryptography — that are believed to be too difficult for quantum computers to solve.

The question is, when will quantum computers become viable? There’s no definitive answer, but recent developments suggest the pace is quickly accelerating:

  • Scientists in China announced their 56-qubit quantum computer took 1.2 hours to complete a task that would otherwise take eight years for the world’s most powerful supercomputer.
  • Between 2019 and 2021, IBM quadrupled the number of stable qubits its quantum computer processor could handle.
  • McKinsey predicts there will be up to 5,000 operational quantum computers by 2030.

 

Woman looking at laptop

Frequently Asked Quantum Questions

Are you struggling with knowing where to start in your post-quantum preparedness journey? Do you want to learn more about quantum computing, and how it will affect your industry?

View our guide to understanding post-quantum cryptography and encryption and answer your budding questions.

Quantum Threat Timeline

Although the timing of the quantum threat is unknown, it’s top of mind for security-conscious organizations. The Global Risk Institute recently surveyed leaders and experts of quantum science and technology to get their opinions on the likelihood and timing of the quantum threat to public-key cybersecurity. Some patterns emerged from their responses as seen in the illustration below.

Is quantum a threat to public-key cybersecurity?

22 experts weigh in on the likelihood of a significant quantum threat to public-key cybersecurity as a function of time

Although the quantum threat will be realized within the decade, the transition to quantum-safe encryption methods will take several years. Fortunately, there’s still time to get the ball rolling and initiate the process. The Global Risk Institute outlines three parameters for organizations to better understand their level of readiness:

  • Shelf-life time: The number of years the data should be protected for
  • Migration time: The number of years needed to safely migrate the systems protecting that information
  • Threat timeline: The number of years before relevant threat actors can potentially access cryptographically relevant quantum computers

Organizations won’t be able to protect data from quantum attacks if the quantum threat timeline is shorter than the sum of the shelf-life and migration times.

Post-Quantum Resources

Entrust's Position

Entrust has taken a leading role in preparing for post-quantum cryptography by collaborating with other organizations to propose new IETF X.509 certificate formats that place traditional encryption methods like RSA and ECC side-by-side with new PQ algorithms.

For example, we’re closely following the work of organizations like the National Institute of Standards and Technology (NIST), which has a project underway to develop algorithms that are resistant to quantum computing and eventually standardize them. We want to help companies sustain their IT ecosystem to reduce replacements, maintain system uptime, and avoid costly changes caused by a lack of preparation.

Entrust has been actively leading the discussions in IETF Forums, where solutions can be considered within the PQ community. Our public propositions are published in the IETF standards forum:

Composite Keys and Signatures for Use in Internet PKI
The widespread adoption of post-quantum cryptography will bring the need for an entity to possess more than one public key for multiple cryptographic algorithms. Since the trustworthiness of individual post-quantum algorithms is in question, a multi-key cryptographic operation will need to be performed so that breaking it requires cracking each component algorithm individually. This requires defining new structures for holding composite public keys and composite signature data.

Read More

Multiple Public-Key Algorithm X.509 Certificates
This document describes a method of embedding alternative sets of cryptographic materials into X.509v3 digital certificates, X.509v2 Certificate Revocation Lists (CRLs), and PKCS #10 Certificate Signing Requests (CSRs).

The embedded alternative cryptographic materials allow a public key infrastructure to use multiple cryptographic algorithms in a single object. Moreover, it enables it to transition to the new cryptographic schemes while maintaining backward compatibility with systems using the existing algorithms. Three X.509 extensions and three PKCS #10 attributes are defined, and the signing and verification procedures for the alternative cryptographic material contained in the extensions and attributes are detailed.

Read More

Problem Statement for Post-Quantum Multi-Algorithm PKI
The post-quantum community (for example, surrounding the NIST PQC competition) is pushing for "hybridized" crypto that combines RSA/ECC with new primitives to hedge our bets against both quantum adversaries. It’s also advocating for algorithmic/mathematical breaks of the new primitives. After two stalled submissions, Entrust submitted a draft that acts as a semi-formal problem statement and an overview of the three main solution categories.

Read More

How Post-Quantum Computing Will Affect Cryptography
Properly designed digital signature schemes used for authentication will remain secure until the day a suitable quantum computer actually comes online. Today’s quantum computers are limited in size and, therefore, pose no threat to present-day cryptography. And several significant engineering obstacles must be overcome before the threat becomes real.

Nevertheless, experts think these obstacles will fade in time. Many predict that a quantum computer capable of breaking today’s standard public-key algorithms will be available within the planned life of systems currently in development.

Today’s public-key algorithms are deployed for authentication, digital signature, data encryption, and key establishment purposes. Once quantum computers of sufficient size become a reality, we’ll need to replace cryptographic schemes for each of these functions.

Data encryption and key-agreement algorithms are susceptible to a recorded-cipher-text attack, in which an adversary today records exchanges protected by pre-quantum algorithms and stores the cipher text for analysis in the future. This is what’s known as a “harvest now, decrypt later” strategy. Once a viable quantum computer is created, hackers will be able to recover the plaintext. Depending on the required algorithm security lifetime, pre-quantum cryptography will become vulnerable sooner for these key purposes.

Once a suitable quantum computer exists, a signer could repudiate signatures created earlier, claiming that they were forged using a private key broken later by a quantum computer.

Post-Quantum and Classical Hybrid Cryptography
There are different approaches on how to prepare for secure cryptographical communications in a post-quantum age. Using a hybrid approach is one of the more popular methods being proposed as a way of transitioning to the as yet undefined PQ algorithms.

The hybrid approach suggests that rather than trust one algorithm, it places traditional algorithms like RSA and ECC alongside new PQ algorithms. This is helpful for current use cases while pre-quantum is an acceptable method for authentication and to test IT ecosystems against PQ algorithms.

Regulations and Standards for Post-Quantum

Keep up with the latest developments in post-quantum standards, strategies, laws, and best practices.


Comments

Popular posts from this blog

VMware fix for Invalid manifest and ova file import failed errors

SOAPUI - import certificate

Centrally Managed Users (CMU) - New Feature in Oracle Database 18c