
Almost two months ago, the National Institute of Standards and Technology (NIST) presented a first draft on a topic that will keep cybersecurity managers of all companies around the world busy in the coming years and decades.
Its title: Transition to Post-Quantum Cryptography (PQC) Standards. Its core message: Many currently approved quantum computer-vulnerable encryption systems, such as RSA, ECDSA, EdDSA, DH and ECDH, will be classified as obsolete by NIST from 2030 and will no longer be approved from 2035.
Encryption systems are now used in practically all sensitive and vulnerable areas of a company: to secure the software in use, digital user and machine identities, networks, email and general data traffic. The problem: many of the algorithms used are based on mathematical problems that are difficult for classical computers to solve - with long computing times - but relatively easy for quantum computers to solve - with significantly shorter computing times. It can be assumed that the security level of the global digital ecosystem will be severely affected by the emergence of the first quantum computers with sufficient qubits - unless companies manage to switch to quantum-safe encryption methods 'in good time'.
Don't put off PQC
So what does the NIST announcement mean (even if it is 'only' a first public draft)? The switch to quantum cryptography can no longer be put off in companies. The necessary processes must be initiated - not at some point, but now. The period available for the switch seems long at first glance. 9 years. Most security managers, as this year's 2024 PKI & Digital Trust Report showed again, mistakenly assume that they will be able to complete their PQC switch in four to six years.
Subscribe to our newsletter now
Read the best news from B2B CYBER SECURITY once a monthHowever, anyone who has ever changed an encryption system will know that the process is complex and usually much more time-consuming. Just think of the change from SHA-1 to SHA-2 advocated by NIST at the beginning of this millennium. In many companies, this ultimately took more than 12 years.
Tackle tasks:
- 1st creation an inventory of all assets affected by a changeover and their certificates.
- 2. Modernization the PKI and signature infrastructure as well as all cryptographic libraries to facilitate the transition to the new NIST-standardized quantum-safe algorithms.
- 3. Use of PQC laboratories to thoroughly test the quantum-safe certificates equipped with the new algorithms in a PKI sandbox before their implementation.
- 4. Implementation and applying PKI/CLM solutions with powerful automation capabilities to manage and mass implement certificate migration – be it through orchestration or protocols.
All security managers can only be advised to initiate these measures as early as possible. 9 years is not a long time. And what is often forgotten is that quite a few cyber criminals are already one step ahead of the defenders. Even today, they are stealing and storing large amounts of encrypted, sensitive data without being noticed by cyber security. They can wait and are waiting. For the first quantum computers to be available to them in ten to twenty years.
They will then be able to take a closer look at the stolen data - which is very likely to include highly sensitive business data. Security officers would therefore do well to initiate their PQC conversion as early as possible. The damage cannot be completely prevented, but it can at least be contained.
More at Keyfactor.com
About key factors
Keyfactor brings digital trust to the hyperconnected world with identity-based security for people and machines. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and object, Keyfactor helps organizations quickly create—and maintain—digital trust at scale.
Matching articles on the topic