Industry Insights with Cdr Rishi Das S. (Retd)

Encryption & Key Management , Security Operations

The Growing Quantum Threat to Enterprise Data: What Next?

Key Steps for Navigating the Cybersecurity Transition to Quantum-Safe Cryptography
The Growing Quantum Threat to Enterprise Data: What Next?
image: Shutterstock

As quantum computing continues its rapid advancement, cybersecurity professionals and enterprise leaders are beginning to grapple with a future where current encryption technologies - on which our entire digital infrastructure is built - may no longer be secure. This looming threat, known as quantum-enabled cyberattacks, poses a significant challenge to enterprise data security, calling for immediate attention to the development and implementation of quantum-safe cryptographic systems.

See Also: How to Take the Complexity Out of Cybersecurity

Quantum Computing Threat: A New Era in Cybersecurity

Quantum computing represents a paradigm shift in computational power. Unlike classical computers, which process information in binary bits (zeros and ones), quantum computers leverage quantum bits, or qubits, which can exist in multiple states simultaneously. This capability allows quantum computers to perform certain types of calculations exponentially faster than classical machines.

One of the most significant implications of quantum computing for cybersecurity is its potential to break widely used encryption algorithms. Many of the encryption systems that safeguard sensitive enterprise data today rely on the computational difficulty of certain mathematical problems, such as factoring large numbers or solving discrete logarithms. Classical computers would take an impractical amount of time to crack these encryption schemes, but quantum computers could theoretically solve these problems in a matter of seconds, rendering many of today's security protocols obsolete.

Even though quantum computers can break current cryptographic systems, the challenge of developing large-scale, stable quantum machines capable of efficiently running these post-quantum cryptography algorithms remains a significant hurdle. Additionally, quantum algorithms require significant resources and error-correction methods to become practical, making it likely that the first quantum cyberattacks will be limited to relatively low-complexity targets, such as smaller datasets or less protected systems.

The initial stages of quantum computing will likely see state actors - as in, governments - and large enterprises having primary access to quantum resources, with commercial enterprises and researchers using these resources through a quantum-as-a-service model.

Transition to Quantum-Safe Cryptography

The term "quantum-safe cryptography" refers to cryptographic algorithms and protocols that are designed to withstand attacks from both classical and quantum computers. The process of transitioning to quantum-safe cryptography involves several key steps:

  1. Assessment of current cryptographic systems: Enterprises need to conduct thorough audits of their current cryptographic systems to identify vulnerabilities that could be exploited by quantum-enabled attacks. This includes evaluating the cryptographic algorithms in use, the types of data they protect and the duration for which the data needs to remain secure.
  2. Collaboration: Organizations also need to forge partnerships with the cryptographic community to stay informed on the latest developments in quantum computing and quantum-safe cryptography. Collaborating with vendors to assess technology availability timelines will provide a more realistic framework for the early adoption of quantum-safe solutions.
  3. Quantum vulnerability assessment: To assess quantum vulnerability, organizations must evaluate the lifespan of their business assets and the time required to transition to quantum-safe infrastructure. This includes calculating the risk that assets may become exposed before adequate protection is in place. It's essential to understand how long encrypted data will remain useful if an adversary can capture and store it for future decryption using quantum technology.
  4. Migration and compatibility: Transitioning to quantum-safe cryptography will necessitate verifying that the new algorithms are compatible with the current infrastructure. This may involve updating software libraries, hardware systems and protocols. Enterprises will also need to consider backward compatibility with legacy systems, as the adoption of quantum-safe cryptography will not happen overnight. Another key consideration for organizations is whether quantum-safe technologies could introduce additional latencies, reliability concerns or performance issues that need to be mitigated.

NIST's Post-Quantum Cryptographic Standard

Recognizing the urgent need to address the quantum threat, the National Institute of Standards and Technology launched a multi-phase effort to develop post-quantum cryptographic standards. After eight years of rigorous research and relentless effort, NIST released the first set of finalized post-quantum encryption standards on Aug. 13.

These standards aim to provide a clear and practical framework for organizations seeking to transition to quantum-safe cryptography. The final selection included algorithms for both public-key encryption and digital signatures, two of the most critical components of modern cybersecurity systems. Here's a short summary of the Federal Information Processing Standard published by NIST:

  • FIPS 203: This standard is based on the CRYSTALS-Kyber algorithm, now renamed ML-KEM, short for Module-Lattice-Based Key-Encapsulation Mechanism. This is intended as the primary standard for general encryption, offering the advantage of smaller, easily exchangeable encryption keys and fast operation.
  • FIPS 204: This standard is based on the CRYSTALS-Dilithium algorithm, now renamed ML-DSA, short for Module-Lattice-Based Digital Signature Algorithm. This is intended as the primary standard for protecting digital signatures.
  • FIPS 205: The standard is based on the SPHINCS+ algorithm, now renamed SLH-DSA, short for Stateless Hash-Based Digital Signature Algorithm. While this, too, is designed for digital signatures, it employs a different mathematical approach from ML-DSA and is intended as a backup method if ML-DSA proves vulnerable.

While FIPS compliance is mandatory for U.S. federal systems, it is crucial for other governments and private enterprises - particularly those handling sensitive data like financial information - to start considering the shift to post-quantum cryptographic algorithms.

Data Security in the Era of Quantum Computing

The era of quantum computing presents both unprecedented challenges and opportunities for data security. When functional quantum computers become available, they will effectively undermine the security of public-key cryptosystems like RSA. Traditional cryptosystems, such as AES, will also be impacted, reducing their effective security strength by about half. The "Harvest Now, Decrypt Later" threat, driven by the future capabilities of quantum computers, poses the risk that a nation-state could collect encrypted data today and later decrypt it once quantum technology becomes available. Moreover, organizations will need to engage in ongoing education and training to ensure that their teams understand the implications of quantum computing for cybersecurity and are prepared to handle new challenges as they arise.

As the world moves closer to the advent of quantum computing, the importance of preparing for quantum-safe cryptography is becoming increasingly clear. By adopting post-quantum cryptographic standards and transitioning to quantum-safe solutions, enterprises can safeguard their data and maintain robust security in the quantum era. The transition is complex and requires thoughtful planning, but with the right strategy, organizations can mitigate the risks posed by quantum computing and ensure the long-term protection of their digital assets.



About the Author

Cdr Rishi Das S. (Retd)

Cdr Rishi Das S. (Retd)

Former Director - Information Security and Digital Transformation, Indian Navy

Das has 21 years of experience in supervisory, operational and functional roles in information security, ICT, governance, compliance, risk management and satellite communication. He actively handled appointments dealing with 24x7 mission-critical systems in both satellite and terrestrial segments necessitating the highest standards of security, resilience and availability. He previously served as the director of information security and digital transformation for the Indian Navy.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.