Post-quantum cryptography: encryption against quantum computers

Post-quantum cryptography: encryption against quantum computers

Share post

Algorithms used today for encryption may soon prove too weak - once quantum computers become practical. Algorithms and hardware must therefore be developed that can also withstand these powerful supercomputers: post-quantum cryptography.

A few years ago, the US federal agency National Institute of Standards and Technology (NIST) initiated a process to define/evaluate quantum-resistant algorithms. The potential candidates were selected in various rounds. In total, more than 80 algorithms were proposed, some of which were dropped quite early. The reason for this was that mathematical attacks were developed for quantum computers that could break or severely weaken the algorithms. NIST has now completed the third round of the evaluation process. The result of this is the recommendation of four algorithms that are considered “quantum safe”.

Race with the quantum computers

Quantum computers initially sound a bit like science fiction or the very distant future. But they could become a reality very soon. In an ad hoc Utimaco survey of customers, 64 percent of respondents said they expect real-world threats from quantum computing within the next five to nine years.

35 percent of these survey participants have therefore already started to introduce post-quantum cryptography in their company. In fact, it is high time for this: If, for example, self-driving cars are developed today that are intended to remain in traffic for ten or more years, they must have encryption that will remain secure in a future with quantum computers.

Far-reaching consequences of broken algorithms

If a vehicle's communication is not adequately secured, there is a risk that criminals could gain access and take control of the cars. It's hard to imagine what that could mean for the occupants. But there could also be far-reaching problems elsewhere.

More and more documents and contracts are now being signed electronically instead of on paper. However, behind the electronic signature there is also a cryptographic process that depends on the integrity of the algorithms used. If an algorithm is broken, all signatures made with it would suddenly no longer have any probative value. To prevent this, companies and institutions should start resigning important digital documents at an early stage. The re-signature with a quantum-safe algorithm ensures the preservation of evidence for the future.

Crypto agility is the best precaution

In addition to digital signatures, identification and authentication processes in the network also depend on secure algorithms that encrypt access data. Criminals who could break this encryption would have a whole new avenue of identity theft. So a world where quantum computers exist but no algorithms designed for them would be an unsettling prospect.

Businesses should position themselves today to be ready for the shift to quantum-proof algorithms when the need arises. This includes, among other things, upgrading the hardware side and purchasing hardware security modules that can handle the new algorithms and more complex keys. This investment is the ideal risk management: as soon as quantum computers become publicly available, companies can quickly upgrade their systems. However, if you then have to start from scratch, it may be too late. The migration time should not be underestimated.

 

More at Utimaco.com

 


About Utimaco

UTIMACO is a leading global provider of high-security technologies for cybersecurity and compliance solutions and services with headquarters in Aachen, Germany and Campbell (CA), USA. UTIMACO develops and produces on-premise and cloud-based hardware security modules, key management, data protection and identity management solutions.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more