By Dr Carl Windsor, Chief Information Security Officer (CISO) at Fortinet
Keeping pace with evolving cyber threats demands relentless adaptability and proactive defense strategies. Advanced persistent threats, ransomware, and wipers are just a few risks organizations must guard against.
However, quantum computing is one of the most complex and far-reaching challenges on the horizon. While not an immediate threat, “collect now, decrypt later” underscores the urgency of preparing for a future where current cryptographic standards may be rendered obsolete.
Thanks to their ability to perform complex calculations exponentially faster than classical computers, quantum computers promise to revolutionize many scientific fields, such as chemistry, physics, and materials science.
However, they also pose a significant risk in the wrong hands—potentially breaking today’s encryption methods and exposing sensitive data to malicious actors.
The Threat to Traditional Encryption
Current encryption protocols such as RSA and ECC (used in HTTPS, SSH, and IPsec VPNs) rely on the difficulty of factoring large numbers or solving discrete logarithm problems for security.
However, quantum computers using advanced methods like Shor’s algorithm could efficiently solve these problems, leaving traditional encryption methods vulnerable to attack.
A sufficiently powerful quantum computer capable of breaking modern encryption is unlikely to be available within the next 8–10 years, although even that time is decreasing with each innovation.
The issue is that adversaries are already collecting and storing sensitive data for future decryption. This highlights the need for proactive measures to safeguard information against post-quantum threats.
Preparing for the Quantum Future
As organizations recognize the risks posed by quantum computing, the need to adopt quantum-safe encryption strategies has never been more urgent.
Concerns over eavesdropping on undersea fiber optic cables and other data interception techniques, for example, reinforce the necessity of securing communication channels now against future quantum threats.
Quantum-safe encryption, or post-quantum cryptography, refers to cryptographic protocols designed to resist these quantum attacks.
Unlike traditional encryption, which depends on computational complexity, quantum-safe encryption is rooted in mathematical problems believed to be insurmountable even for quantum computers. Examples include lattice-based cryptography, hash-based cryptography, and multivariate polynomial cryptography.
Quantum-Safe Encryption Strategies
Organizations must adopt quantum-safe encryption techniques that can withstand quantum computing advancements to counteract these threats. Three major approaches are being explored today:
- Quantum Key Distribution (QKD): Leverages quantum mechanics to securely distribute symmetric encryption keys in an untrusted environment.
- Quantum-Safe Encryption: Uses proprietary techniques to ensure a secure key exchange resistant to quantum attacks.
- Post-Quantum Cryptography (PQC): Implements new cryptographic algorithms believed to be difficult for quantum computers to solve, such as lattice-based encryption.
The Race for Quantum-Safe Solutions
In response to the looming threat of quantum computing, the global cybersecurity community has been actively developing quantum-safe encryption standards.
The National Institute of Standards and Technology (NIST) has spearheaded the Post-Quantum Cryptography Standardization project to evaluate and standardize quantum-resistant algorithms. Through rigorous selection and cryptographic analysis, NIST is paving the way for the widespread adoption of quantum-safe encryption.
However, transitioning from traditional encryption to quantum-safe solutions presents challenges, including interoperability, performance impact, and backward compatibility. Organizations must carefully assess their cryptographic infrastructure and create a roadmap for migration to quantum-resistant encryption.
Protecting Today’s Data Against Tomorrow’s Threats
As cyber threats evolve, ensuring the long-term security of sensitive information is paramount. Quantum-safe encryption offers a proactive approach to mitigating quantum risks and securing critical data against future decryption attacks.
By investing in quantum-safe solutions today, organizations can future-proof their cryptographic infrastructure, ensuring resilience in the face of rapid technological advancements. While the transition to quantum-safe encryption is complex, the benefits of securing sensitive data far outweigh the costs.
It Takes a Village
By harnessing the power of quantum-resistant cryptographic algorithms and advancing QKD technologies, we can secure our data against the threats of the quantum era. But no single entity can tackle this challenge alone. The shift toward quantum-safe encryption is a collaborative effort requiring input from researchers, policymakers, and industry leaders.
But the challenge is clear. As quantum computing continues to develop, the time to act is now. Ensuring data security for the future demands a collective commitment to innovation, standardization, and the adoption of quantum-safe encryption practices.
Together, we are paving the way for a future where data security transcends the bounds of classical computing, ushering in a new era of quantum-safe communications and cryptography.