The primary problem concerned when preparing for quantum computing is the implications it has for cybersecurity and the Public Key Infrastructure (PKI) and cryptography markets. Contemporary encryption schemes such as ECC (Elyptic-Curve Cryptography) and RSA (Rivest, Shamir and Adleman), which are used to protect the exchange of digital data are not equipped to prevent attacks from Quantum Computers.
By David King is the Chief Innovation Officer for GlobalSign.
The RSA in particular, developed in the 1970s, is virtually impossible for modern classical computers to break due to the difficulty of calculating prime factors of the algorithm in a reasonable amount of time.
For Quantum Computers however, this is no difficult task whatsoever. Because of this, when quantum computers are available, all data exchanged digitally will be at risk, from government, to financial, to medical and personal data.
Luckily, the development of quantum computers itself has complex challenges, and it is estimated that practical quantum computers won’t be available for at least another decade. The quantum computing models of today only surpass the classical computer at a handful of functions, giving the security market, and the rest of the world, time to prepare for their arrival.
Last month, the National Institute of Standards and Technology (NIST) in the United States, has announced that they have finalized the standardization of three post-quantum cryptographic schemes.
The current minimum NIST recommendations for RSA algorithms, for example, is 2048-bit, which was updated from a 1024-bit minimum in 2015. The challenge at hand, is that Public Key cryptography is the primary method used to secure the identities of devices, servers, browsers and digital communications everywhere. Once Quantum Computers arrive there will need to be a large-scale replacement of non-quantum-safe schemes in all of their use cases.
What are NIST’s Three Post-Quantum Cryptography Standards?
NIST has currently finalized three standards for quantum-safe cryptographic schemes:
- FIPS (Federal Information Processing Standard) 203: Developed from the CRYSTALS-Kyber algorithm, and also known as the Module-Lattice-Based Key-Encapsulation Mechanism, referring to its lattice-based cryptographic scheme which supports PQC unlike more widely used cryptographic schemes like RSA. This will likely be the standard for general encryption, with its advantages being its relatively small keys and functional expediency.
- FIPS 204: Developed from the CRYSTALS-Dilithium algorithm, or Module-Lattice-Based Digital Signature Algorithm. Created as a primary standard for digital signatures, this will be able to support larger signatures and public keys, while greatly exceed modern verification speeds.
- FIPS 205: Using the Sphincs+ algorithm, or Stateless Hash-based Digital Signature Algorithm supports small public keys but produces large digital signatures. Based on a different mathematical scheme than the first two, this was created with a hash algorithm and is intended to serve as a secondary method to FIPS 204 in case it proves to be vulnerable.
NIST has also announced a fourth algorithm, which will be known as FIPS 206, based on the FALCON algorithm, or FN-DSA which is short for FFT [fast-Fourier transform] over NTRU [Number Theory Research Unit]-Lattice-Based Digital Signature Algorithm. This will also support digital signatures and is expected to be finalized in late 2024.
What this Could Mean for PQC Adoption and Why Quantum Preparedness Matters Now
Since the development of the first Quantum prototypes by D-Wave Systems in the noughties, the world has been awaiting new advancements in Post-Quantum solutions, but not much information has been available about the Post-Quantum world, with even cryptographic and security experts still shaping what Post-Quantum solutions and certificates will look like.
However, these new standards are a first step for global quantum preparedness, motivating organizations, browsers and Certificate Authorities (CAs) to move forward in their planning for Q-day. Whereas before, not much information was available, now there is at least some idea of what organizations should be implementing in their planning. Experts are said to expect a transformation across the global supply chain to ensure that vulnerable systems are provisioned for in the event that a functional Quantum Computer emerges.
While this development offers organizations better insight into the situation, there are however, other barriers to overcome when preparing for the Quantum arrival in the security market. CAs don’t currently have compatible Hardware Security Modules (HSMs) to provision for Post-Quantum-Safe certificates, and while it is still difficult to predict what a Post-Quantum market may look like, it is a challenge for compliance frameworks like the CA/B (Certificate Authority/Browser) Forum to provision for Post-Quantum Safe technologies.
The trouble is that organizations ideally need to be prepared well before a viable quantum system arrives. It is not only that we will need to replace current classic cryptographic protocols in every device, network, server and identity. We will also need to prepare current use-cases which will still be in use when it does arrive. This will especially affect those use-cases which are still in early development like new software or IoT connected devices. Not only this, but cyber-criminals have developed a system known as “harvest now, decrypt later” wherein they access and store critical data to be decrypted in the future when they may have access to a viable quantum system.
While more cryptographic standards are in development, they could not come soon enough, as organizations market regulators prepare themselves for the arrival of a workable quantum computer. This requires the cooperation of every digital entity to ensure that digital communications remain safe, as even the smallest vulnerability could result in disaster once Q-Day is here.
Fonte: GlobalSign
GMO GlobalSign lança o Gerenciador de Automação de Certificados
INTERNATIONAL NEWS
Crypto ID promotes international articles about a wide range of topics, including information security, cybersecurity, cryptography, digital identification, encryption, biometrics, blockchain technology, and cryptocurrencies, encompassing data and other technologies related to cybersecurity and digital transformation.
During the last ten years, Crypto ID has been providing innovative content about digital security, identification, and privacy solutions. We celebrate this journey with the certainty that trust is the base for a solid and promising digital future.
Advertising at CRYPTO ID, your organization contributes to the dissemination of technological innovations that enable secure and reliable electronic transactions between businesses and people.
+55 11 3881-0053 | contato@cryptoid.com.br
Criptografia forte é o padrão que mantém bilhões de pessoas seguras todos os dias
O Dia Mundial da Criptografia ocorre anualmente em 21 de outubro e nessa data a Global Encryption Coalition – Coalizão Global de Criptografia e seus associados promovem artigos para proteger e defender o uso da criptografia forte. A campanha é direcionada a organizações da sociedade civil, governos, empresas, tecnólogos e bilhões de usuários da Internet em todo o mundo. Este ano, o Crypto ID, representante do Brasil na coalizão, inicia sua campanha em setembro uma vez que criptografia é um dos principais temas com os quais trabalhamos. Quer participar dessa campanha com a gente? Escreva um artigo sobre criptografia e envie para nossa redação até dia 18 de outubro, mas quanto antes melhor! – redacao@cryptoid.com.br
#DiaGlobaldaCriptografia #Criptografia #SegurancaDigital #Privacidade #GlobalEncryptionCoalition #CryptoID #GlobalCryptoDay