Last week, we drew attention to political volatility and strategic competition in South Asia and highlighted implications for multinationals in the region.
This week, we highlight NIST’s recently released standards for post-quantum cryptography and provide recommendations for organizations on quantum resilience.
Please subscribe to read future issues — and forward this newsletter to interested colleagues.
Contact us directly with any comments or questions: [email protected]
On August 14, 2024, the National Institute of Standards and Technology (NIST) announced three new encryption algorithms as the basis for post-quantum cryptography (PQC). This milestone marks the beginning of a critical transition period for organizations worldwide. Despite the infancy of quantum computing, we urge Chief Information Security Officers (CISOs) and other technology leaders to begin preparing now for the potential quantum threat to current encryption methods.
As one NIST mathematician recently said, “There is no need to wait for future standards. Go ahead and start using these three. We need to be prepared in case of an attack that defeats the algorithms in these three standards, and we will continue working on backup plans to keep our data safe. But for most applications, these new standards are the main event.”
After eight years of review and development, the three NIST-approved algorithms are:
The release of these standards triggers several actions mandated by the Quantum Computing Cybersecurity Preparedness Act of 2022, including:
As the federal government moves forward, the private sector will feel compelled to follow, even if regulatory requirements lag in most sectors beside critical infrastructure and potential engineering challenges delay or stall forecasts for the technology.
Quantum computers leverage the principles of quantum mechanics to execute certain algorithms exponentially faster than classical computers. While this presents enormous opportunities for scientific advancement and economic growth, it also poses a significant threat to current cryptographic systems. A sufficiently powerful quantum computer could break many of the public-key cryptography methods currently used to secure digital communications and transactions worldwide.
The National Security Memorandum on Promoting United States Leadership in Quantum Computing (NSM-10) highlighted the following quantum risks:
“Sec.3. Mitigating the Risks to Encryption. (a) Any digital system that uses existing public standards for public‑key cryptography, or that is planning to transition to such cryptography, could be vulnerable to an attack by a CRQC. To mitigate this risk, the United States must prioritize the timely and equitable transition of cryptographic systems to quantum-resistant cryptography, with the goal of mitigating as much of the quantum risk as is feasible by 2035… Central to this migration effort will be an emphasis on cryptographic agility, both to reduce the time required to transition and to allow for seamless updates for future cryptographic standards. This effort is an imperative across all sectors of the United States economy, from government to critical infrastructure, commercial services to cloud providers, and everywhere else that vulnerable public-key cryptography is used.”
CISA has launched a Post-Quantum Cryptography (PQC) initiative to unify and drive transition efforts across the federal government and private sector, with a focus on critical infrastructure and government network owners and operators. In 2021, CISA and NIST created a roadmap to guide these efforts (see below).
China’s “collect now, decrypt later” approach has raised significant concerns. This strategy involves harvesting encrypted data now, with the intention of decrypting it once quantum computers become capable. This poses a long-term threat to sensitive data across various sectors. While the timeline for the realization of cryptographically relevant quantum computers is hotly debated (with optimistic estimates ranging from 5-10 years to pessimists that argue they may never be practically realized), the fear of an adversary’s surprise breakthrough has driven policy urgency.
As Deputy National Security Advisor for Cyber and Emerging Technologies Anne Neuberger said recently, “What’s the data that you’d care about if an adversary could use a quantum computer in nine or 10 years to decrypt it? We have lots of that in the intelligence community. We have lots of that in our Department of Defense, and as such, ensuring that collect now, decrypt later can be addressed is something that’s a priority for us.”
Meanwhile industry and government investment in quantum computing is accelerating, with recent advances in error-correcting and stronger hardware encoding fostering optimism in the practicality of scientific and economic applications. Boston Consulting Group released an updated forecast in July 2024, that expects the industry to move from the current era of “noisy intermediate-scale quantum” (NISQ) devices to “broad quantum advantage” by 2030 and “full-scale fault tolerance” after 2040, generating $450 to $850 billion in economic value.
Implementing new cryptography takes time, and firms need a substantial lead time to have protections in place before quantum threats materialize. Asymmetric encryption algorithms, the backbone of much of our current secure communications, are particularly vulnerable to quantum attacks.
The new PQC algorithms, while more resistant to quantum computing, often demand larger key sizes and more computational resources. This poses a significant hurdle, especially for embedded systems with limited resources. Moreover, during the transition period, systems will need to juggle both classical and post-quantum algorithms to maintain compatibility with legacy systems, adding another layer of complexity, and potential security risks.
Despite these challenges, industry players are already on the move. Firms like Google and Cloudflare are early adopters, already implementing draft PQC proposals. Meanwhile, standards bodies such as the Internet Engineering Task Force (IETF) are working to incorporate PQC into fundamental protocols like Transport Layer Security (TLS), which secures much of our internet traffic. Alphabet even spun off a unit, SandboxAQ, to focus on quantum tech and “encryption remediation.”
For CISOs, the message is clear: it’s time to develop a “cryptographic agility strategy”. This means not only identifying where sensitive data is stored and understanding current cryptographic protections but also ensuring systems can swiftly switch to quantum-resistant algorithms without major disruptions. Some firms are exploring quantum-safe virtual private networks as an early, concrete step towards quantum readiness.
Justifying Mitigations Given Uncertainty
The shift to PQC is more than just a technical update; it’s a fundamental change in how we approach data security. It promises to be more complex and time-consuming than any cryptographic transition we’ve seen before. CISOs need to think beyond just data encryption and consider the impact on software integrity verification methods as well.
An Office of the National Cyber Director report estimates that the total government-wide cost for migrating prioritized information systems to PQC between 2025 and 2035 will be approximately $7.1 billion in 2024 dollars. It will be an even more expensive and complex endeavor for critical infrastructure companies to follow suit.
While the threat is inherently uncertain and unquantifiable, the business case for risk mitigation is future-proofing. While quantum computers capable of breaking current encryption may not be common for another decade (or more), hardware and software with long lifespans could find themselves made suddenly vulnerable as a result of a technical breakthrough that catches the unprepared by surprise.