Quantum Computing & Crypto
Miles Dolphin
Cyber Security, Technology and Risk Executive | Board Member | CISSP | Speaker | Patent Holder
Amazing effort by the Cyber hero's Bill Newhouse (Cybersecurity Engineer at NIST) and Cherilyn Pascoe (Director of Cyber Security at NIST) on their work to prepare multiple industries for Post-Quantum Cryptography. Also many thanks to Larry Letow for organizing a deep dive on Crypto.
Key Sections -- Ground Breaking Research from NIST, EY, PWC, Forbes, McKinsley, etc...
Imagine The Future
Predictions
Currently as of late last year IBM has already setup a quantum computer to solve a problem that stumps existing methods, which is quickly being termed the “quantum advantage”.. Fast forward further..
Funding Of Quantum View
Risk Lens
High Level Risks
The Internet and all computer devices which use Cryptography are at risk, because this technology means our existing ways to secure our devices needs to be upgraded and re-deployed across our entire technology estate
In Simple Terms
-???????? Integrity - Not being able to validate data has not been tampered with
-???????? Confidentiality – Not able to ensure our data is kept secure
-???????? Authenticity – Not able to know if we are talking to who we think we are
Before and After
Where Am I Most Vulnerable Today?
Note - Key strength increase is due to Grover’s algorithm – which speeds up attacks by effectively HALFing the key length associated with symmetric algorithms..? 128bit .. so 256k becomes the new 128 bit
That said, I would suspect there will be service level enhancements that most companies can migrate to if they are using a cloud based offering. Therefore the work will be more for people having on-prem implementations.
NOTE - While digital certificates are also vulnerable if a historical transaction were to be compromised it is probably less risky, as the connection has already occured. Example: payment has already been made.
Global Investments on Quantum - In the Billions!
China, Israel1?and Russia2?have all developed quantum computers, with China’s efforts on its Jiuzhang quantum computer claiming quantum supremacy3?in 2019.
领英推荐
Practical Advice - Don't Wait till It is too late
1a. Internal Inventory - All Websites using HTTPS, All Secure Connections (VPN Tunnels), Firmware, Smart Cards, etc
1b. Third Party Risk - Identify all Vendors that are using cryptography.
1c. Understand the data flows and where cryptography is used to secure data
There are multiple discovery tools coming out to help you find your crypto.
2. Prioritize Based on Risk
2a. Crown Jewels – Most critical services generating revenue, has the most sensitive data or intellectual property
2b. Widest Blast Radius - Pervasive infrastructure such as DHCP, DNS, Networking, Firewalls
3. Determine Scope for Historical Data
3a. Data Shelf Life - How long do you have data that needs to be protected
or needs to be re-encrypted?
3b. System Shelf Life - How long does your system have to stay online and secure
4. Determine Your Speed of Migration
4a. Development Cycle - How long will it take to do the necessary development and migration
4b. Changing of vendors
4c. Upgrading HSM's, re-issuing certificates, etc
5. Select Your Approach
5a. TACTICAL -- Enhancing traditional encryption -- moving from RSA-1024 to RSA-2048 encryption may extend security lifetimes by one to three years. Also some articles are focusing more on Homomorphic Encryption as we know that data masking alone is not sufficient.
5b. STRATEGIC -Most to a preferred encryption algorithm that is quantum resistant such as Kyber, Dilithium or Sphincs as outlined below.
What Encryption Should We Use?
As per NIST guidelines
How to Get Involved - With NIST
There has been tremendous thought leadership and communities coming together to establish a center of excellent for quantum computing and quantum cryptography
Further Guidelines Coming Out
References
Very informative. Great share Miles.
Senior Product Development Manager @ Amentum Certified Scrum Product Owner, ITIL V4, Certified Customer Centric Practitioner.
10 个月While I think this is a good thing for advancement of our overall security posture. I worry about the impact of this on smaller SMEs who may have to upgrade infrastructure and knowledge just to keep doing what they are doing. Having been through a number of excercises trying to move thousands of trading partners away from FTP, and then to TLS, so many of them are running on old kit and protocols and don’t have the money or skills to enact change of this nature ; it genuinely becomes a barrier to doing business with those that are early adopters. I don’t know the answer here, but as security gets harder, I think some otherwise good businesses might fall by the wayside without some real creative thinking amongst the cyber community about how to bring everyone on the journey together.
Founded Doctor Project | Systems Architect for 50+ firms | Built 2M+ LinkedIn Interaction (AI-Driven) | Featured in NY Times T List.
10 个月Quantum leaps require radical rethinking. Is our tech infrastructure ready?
? Infrastructure Engineer ? DevOps ? SRE ? MLOps ? AIOps ? Helping companies scale their platforms to an enterprise grade level
10 个月Indeed, the advancements in Quantum Computing and Cryptography are fascinating. How can existing technologies adapt securely? Miles Dolphin