Algorithms used today for encryption may soon prove too weak - once quantum computers become practical. Algorithms and hardware must therefore be developed that can also withstand these powerful supercomputers: post-quantum cryptography.
A few years ago, the US federal agency National Institute of Standards and Technology (NIST) initiated a process to define/evaluate quantum-resistant algorithms. The potential candidates were selected in various rounds. In total, more than 80 algorithms were proposed, some of which were dropped quite early. The reason for this was that mathematical attacks were developed for quantum computers that could break or severely weaken the algorithms. NIST has now completed the third round of the evaluation process. The result of this is the recommendation of four algorithms that are considered “quantum safe”.
Race with the quantum computers
Quantum computers initially sound a bit like science fiction or the very distant future. But they could become a reality very soon. In an ad hoc Utimaco survey of customers, 64 percent of respondents said they expect real-world threats from quantum computing within the next five to nine years.
35 percent of these survey participants have therefore already started to introduce post-quantum cryptography in their company. In fact, it is high time for this: If, for example, self-driving cars are developed today that are intended to remain in traffic for ten or more years, they must have encryption that will remain secure in a future with quantum computers.
Far-reaching consequences of broken algorithms
If a vehicle's communication is not adequately secured, there is a risk that criminals could gain access and take control of the cars. It's hard to imagine what that could mean for the occupants. But there could also be far-reaching problems elsewhere.
More and more documents and contracts are now being signed electronically instead of on paper. However, behind the electronic signature there is also a cryptographic process that depends on the integrity of the algorithms used. If an algorithm is broken, all signatures made with it would suddenly no longer have any probative value. To prevent this, companies and institutions should start resigning important digital documents at an early stage. The re-signature with a quantum-safe algorithm ensures the preservation of evidence for the future.
Crypto agility is the best precaution
In addition to digital signatures, identification and authentication processes in the network also depend on secure algorithms that encrypt access data. Criminals who could break this encryption would have a whole new avenue of identity theft. So a world where quantum computers exist but no algorithms designed for them would be an unsettling prospect.
Businesses should position themselves today to be ready for the shift to quantum-proof algorithms when the need arises. This includes, among other things, upgrading the hardware side and purchasing hardware security modules that can handle the new algorithms and more complex keys. This investment is the ideal risk management: as soon as quantum computers become publicly available, companies can quickly upgrade their systems. However, if you then have to start from scratch, it may be too late. The migration time should not be underestimated.
More at Utimaco.com
About Utimaco
UTIMACO is a leading global provider of high-security technologies for cybersecurity and compliance solutions and services with headquarters in Aachen, Germany and Campbell (CA), USA. UTIMACO develops and produces on-premise and cloud-based hardware security modules, key management, data protection and identity management solutions.