Developing a post-quantum mindset for a conventional world Reissue every encryption key – by yesterday?
This week Brendan Rowan had the pleasure of moderating a panel on “Post-quantum Data Protection” in Venice as part of the inspiring and dynamic Privacy Symposium. (Chapeau Sébastien Z. and Luca Bolognini for another excellent edition).
With the expert panel of Magdalena Stobinska , Nick Espinosa and David Goodman , we delved into the topic of post-quantum cryptography and the immediate need for organisations to update their systems to prepare for a post-quantum reality.
A primer: cryptography and post-quantum data protection
Conventional cryptography comes in two forms: symmetrical and asymmetrical. Symmetrical cryptography is where the sender and receiver share the same private encryption key that encrypts and decrypts the communication. The key is most commonly protected through the encryption standard (AES 256) is almost impossible to break, however, if the key is lost or intercepted, the data is inaccessible or can be breached without detection.
Asymmetrical has two keys a private key belonging to the receiver and a public key that is generated and shared with the sender, both keys have a mathematical relationship. The public key can be readily accessed, but with only one key it is still not possible to access the data and is commonly applied in small data transfers over the internet.
?The protection of the encryption is based on difficult math problems, e.g. integer factorization, that is believed to be too difficult for conventional computing to crack, the longer the key the greater the difficulty.
?But quantum computing is not the same as conventional, it can perform different maths like the Shor’s algorithm, that can break the encryption keys readily, particularly in case of the assymetric public-private key coupling. Though the advent of a stable quantum computing system remains an open question, there is a real and serious risk to all existing encryptions in place.
Post-quantum security can look to apply new standards for quantum resistant algorithms (see recent NIST announcement[1]), leverage true randomness present in quantum states and deploy Quantum Key Distribution which is transformed by observation by a third-party.
领英推荐
Key takeaways:
?Post-quantum cryptography is not sci-fi, it is today. We may know our current momentum but not our position on the journey to the post-quantum future. It is clear that we need to build the global networks and standards around this to ensure that organisations and governments ensure the future security of our ever-greater digital fingerprint.
?Follow these global standards initiatives on INSTAR (https://instarstandards.org/) and understand how the skills for cybersecurity professionals are shifting with LEADS (www.advancedskills.eu).
[3] Cost of a Data Breach Report 2023 IBM
Tech, Policy and Skills
8 个月Was an excellent and super practical discussion - no need to be a quantum physicist to know the risk!