Quantum computing was long considered to be part of a distant future. However, it is quickly becoming a reality. Google’s recent announcement of its Willow quantum computing chip is a breakthrough generating significant media attention and questions about the implications for cybersecurity. Google’s Willow advancements are significant because of two major breakthroughs critical to the commercialization and adoption of useful quantum computers. The first is that Willow reduces errors as it scales up to more qubits. Historically, the major challenge with quantum computing has been that adding more qubits causes the error rate to increase, rendering the quantum computer impractical for solving complex problems. The second major achievement is the speed of Willow’s computations. Using the random circuit sampling (RCS) benchmark, Willow completed a computation in less than 5 minutes that would take a classical supercomputer 10 septillion years.
Although impressive, random circuit sampling (RCS) has limited real-world utility and essentially zero commercial relevance. Quantum computers are still unable to outperform classical supercomputers with commercially relevant applications. While Google’s Willow advancements lay the foundation for a future where quantum computers can revolutionize the world of computing, we are not there yet. Years of additional work needs to be done to move quantum computing platforms beyond the carefully constructed benchmark use cases where they excel to commercially relevant use cases.
As mentioned above, commercially useful quantum computers are still years away. At the same time, concerted efforts are underway to prepare for the post-quantum age in cybersecurity and other relevant domains. Cybersecurity is poised to be one of the areas most impacted by quantum computing for one reason: algorithms. Many of today’s widely used encryption algorithms, such as RSA and ECC (Elliptic Curve Cryptography), rely on mathematical problems that are computationally difficult for classical computers to solve. However, quantum computers, leveraging the principles of quantum mechanics, can potentially break these algorithms with algorithms like Shor’s algorithm. This could render sensitive data, secure communications, and digital identities vulnerable to attacks.
It is expected that commercially viable and accessible quantum computers will have widespread impacts across cybersecurity. The most heavily impacted systems will be those that rely on algorithms that are vulnerable to quantum attacks.
PKI, the backbone of digital trust, is fundamental for issuing digital certificates used to secure websites, emails, and online transactions. Current PKI implementations rely heavily on algorithms like RSA and ECC, which are vulnerable to quantum attacks. Quantum computers could forge certificates or decrypt encrypted data, enabling attackers to impersonate legitimate entities, conduct man-in-the-middle attacks, and compromise the integrity of communications.
Solution: Transitioning PKI systems to support NIST’s quantum-resistant standards, such as FIPS 203 (derived from CRYSTALS-Kyber for encryption), FIPS 204 (derived from CRYSTALS-Dilithium for digital signatures) and FIPS 205 (derived from SPHNICS+ for digital signatures), will prove essential for maintaining security in the quantum computing age.
HSMs are dedicated hardware devices that form a critical part of robust PKI systems. HSMs are designed to securely generate, store, and manage cryptographic keys. Today, HSMs typically use a combination of algorithms that are vulnerable and resistant to quantum attacks. Three prominent algorithms that are vulnerable to quantum computers include RSA, Elliptic Curve Cryptography (ECC) and Diffie-Hellman. These algorithms are used for asymmetric encryption and key exchange. Conversely, symmetric encryption such as AES, and hashing algorithms like SHA-256 are considered to be more quantum resistant.
Solution: Leading HSM providers, including Thales and Entrust, provide support for a wide range of algorithms, including quantum resistant algorithms like those proposed by NIST. Upgrading HSMs to support NIST’s post-quantum algorithms ensures they remain effective in securing sensitive data. Choosing a HSM that has crypto agility by allowing you to easily adopt new algorithms will be key to future-proofing your cryptographic framework against the risk of quantum attacks.
CLM systems automate the issuance, renewal, and revocation of digital certificates. As quantum-resistant cryptographic algorithms become standardized, CLM systems must adapt to handle certificates that use these new algorithms. This transition presents both challenges and opportunities for organizations.
Challenges and Adaptations:
Integrating NIST’s post-quantum standards into CLM systems will be crucial for organizations to streamline certificate management and transition securely to quantum-resistant cryptography. This will involve updating certificate templates, validation rules, and automation workflows to accommodate the new algorithms. Leading certificate lifecycle management solutions, such as Keyfactor and Venafi, provide a shortcut to implementing both crypto agility and certificate authority (CA) agility. Having both crypto and CA agility enables your organization to quickly adopt certificates backed by quantum resistant algorithms and switch between CAs in the event of a major distrust event or vulnerability.
Data encrypted using current algorithms, whether at rest or in transit, could be vulnerable to decryption by future quantum computers. This “harvest now, decrypt later” threat underscores the urgency of transitioning to quantum-resistant encryption methods as soon as possible. “Harvest now, decrypt later” refers to the potential risk of encrypted sensitive data being compromised now and decrypted in the future when quantum computing technology is sufficiently advanced to crack the algorithm.
Solution:
Organizations must proactively adopt quantum-resistant encryption methods to protect their sensitive data. This includes:
By adopting quantum-resistant encryption, organizations can ensure the long-term confidentiality and integrity of their data, even in the face of evolving quantum threats.
IAM systems often rely on cryptographic protocols to authenticate users and authorize access to systems and data. Quantum computers could potentially break these protocols, jeopardizing the security of sensitive information and systems.
Solution:
IAM systems must transition to quantum-safe authentication methods. This might involve:
Upgrading IAM systems to incorporate quantum-resistant mechanisms is essential to maintain robust security and protect against unauthorized access in the post-quantum era.
Recognizing the urgent need for quantum-resistant cryptography, the National Institute of Standards and Technology (NIST) initiated a process in 2016 to solicit, evaluate, and standardize new cryptographic algorithms that can withstand the power of quantum computers.
After years of rigorous analysis and review, NIST announced the first four algorithms selected for standardization in July 2022. These algorithms were chosen for their strong security properties, performance characteristics, and suitability for various use cases.
NIST plans to finalize a fourth algorithm, FALCON, for digital signatures in late 2024. This algorithm is expected to be useful in applications where smaller signature sizes are required.
These standardized algorithms provide a crucial roadmap for organizations to transition to post-quantum cryptography. However, adopting these standards requires careful planning, investment, and operational adjustments, particularly for large enterprises with complex systems.
While commercially viable quantum computers capable of breaking current encryption may still be a few years away, the time for organizations to prepare is now. The transition to post-quantum cryptography (PQC) is a complex undertaking that requires careful planning, strategic investment, and a phased approach.
Why Proactive Planning is Crucial:
Conduct a Quantum Readiness Assessment:
A comprehensive Quantum Readiness Assessment provides a baseline of your organization’s current cryptographic posture and identifies vulnerabilities to quantum attacks. This assessment should include:
Prioritize High-Value Assets:
Identify your organization’s most critical and sensitive data and systems. Prioritize these assets for migration to PQC to ensure their long-term protection.
Develop a Phased Migration Plan:
Create a phased approach to transition to quantum-resistant algorithms. This might involve:
Monitor NIST Standards and Implement Cryptographic Agility:
Stay informed about NIST’s ongoing standardization efforts and adopt the recommended algorithms. Build flexibility into your systems to facilitate the adoption of new algorithms and standards as they evolve. This might involve using cryptographic libraries or frameworks that support multiple algorithms and allow for easy updates.
Invest in Training and Awareness:
Educate your IT team and security personnel about the quantum threat and the importance of PQC. Provide training on implementing and managing quantum-resistant cryptographic systems. Engaging with industry groups like the PKI Consortium can enable your organization to be on the leading edge of advancements related to post-quantum cryptography.
Engage with Experts:
Partner with cybersecurity experts like Accutive Security to assess your quantum readiness, develop a comprehensive PQC strategy, and implement quantum-resistant solutions.
By taking these proactive steps, organizations can mitigate the risks posed by quantum computing and ensure the long-term security of their data and systems.
The post Post-Quantum Cryptography: The Implications of Google’s Willow and Other Quantum Computers for Cybersecurity first appeared on Accutive Security.
*** This is a Security Bloggers Network syndicated blog from Articles - Accutive Security authored by Paul Horn. Read the original post at: https://accutivesecurity.com/post-quantum-cryptography-the-implications-of-googles-willow-and-other-quantum-computers-for-cybersecurity/