Quantum Cybersecurity, where Quantum Computing and Information Security intersects, is a keen interest of mine. I read news articles, research papers and books where available, listen to lectures on various platforms, try to code, and have recently been joining meetups and conferences. It is a way to learn and progress, but to understand and remember, the materials need to be thought over or studied and there is only so much of this I can discuss with a rubber duck . This blog is a way for me to focus the brainstorm of my thoughts. By writing things down, it helps me to reflect further and in depth on a subject. Plus, a blog can be referenced back to… a rubber duck doesn’t record my musings!
Without further ado, let me reflect on a recent conference I attended online. When I joined Quantum Tech 2021 I wasn’t sure what outcome I wanted from the conference, except of course networking. As the day went along, I realised I was getting answers to questions I’ve been pondering on since my thesis. Questions that had been floating around in my thoughts but not defined or written down.
“What sort of data has long retention? Are we ready for organisations to change encryption when there is no standard yet? Has the urgency to be quantum resistant changed? Should the organisations be doing something concrete about it?”
My thesis concerned the impact of Quantum Computing on Information Security, and one critical impact is that commonly used encryption methods are at risk of being broken or weakened once quantum computers have the capacity to run certain quantum algorithms on a large scale. These are the same cryptographical methods that for example secure browser communication (https) or protects one’s credit card transactions. And, since the quantum machines will come into existence in around the next ten years, the industry is working hard on solutions – whether it is to develop and standardise quantum and post quantum cryptography techniques which will be resistant to such weaknesses or to find solutions from an organisational point of view i.e what can an organisation do to protect its assets. My thesis reflected on the former and my remaining questions had more to do with the latter.
Organisations are being encouraged to consider the risks on their assets and the weak points in their systems. A risk already present is that data encrypted by a cryptographic method that could be broken in the quantum future, could be intercepted, stored to be decrypted and accessed later for whichever use the attacker obtained the data. So, my first question was what sort of data has a retention life of around 10 years and need to be secured now? I had been thinking about it and from the conference talks and chats with presenters, I got some answers. It would be assets such as intellectual property of a company, trade secrets, medical records of patients, defence plans of nations, certain legal documents, and certain financial documents. I’m still pondering on other such assets. Let me know if you have other examples!
The industry is also working hard on standardising post quantum methods. The National Institute of Standards and Technology is researching a new standard for encryption. And this brings up my next question; since NIST standards on a post quantum cryptographic technique will not be finalised for another year or more, then how could a company start using a resistant quantum cryptographic method now? During the conference, there were a few Quantum Cybersecurity companies presenting and it was eye opening to learn that they have cryptographic methods (post quantum cryptographic NIST candidates mixed with classical methods) in place for organisations to start getting quantum ready. The salient point is that all the companies show crypto agility and scalability i.e in the near future, once the NIST standard is in place, the company has contingency plans to move to that method (if the standard is not already the method used) and in the far future, if a method used is no longer secure, it would be easy to move to another. It seems the Quantum Cybersecurity industry is ready now to assist organisations in becoming quantum resistant on the security aspects.
It is also important to bear in mind that attackers are more and more proficient and resourceful. Has the urgency to become quantum resistant changed? The urgency to secure data has changed, years ago an attack was likely to be from someone’s basement but nowadays, it could be an attack funded by an establishment. And meanwhile, Quantum Computing development is moving quickly. The threats definitely exist.
Considering this, should organisations be doing something now? The answer is yes. Consider your organisation (e.g. Do you have encrypted data assets with 10 years shelf life? Which cryptographic methods are you using?) and the resources at your disposition (can you start an in-house or outsource risk assessments or vulnerability assessments? Can you increase your encryption key length? Can you move to quantum resistant techniques?) Start having your security analysts ask questions, monitor the development in Quantum Computing and keep track of post quantum cybersecurity standards. There is no need to panic, but it is time to get ready.