Skip to main content

Embracing Post-Quantum Cryptography in the Quantum Era

abstract

What is post-quantum cryptography (PQC) and how does it work?

Quantum computers utilize cutting-edge technology to solve complex problems that are beyond the capabilities of classical computers. Although most experts believe that a Cryptographically Relevant Quantum Computer (CRQC), capable of breaking classical encryption keys, is still years away, the threat of 'harvest now, decrypt later' (HNDL) attacks is already causing concern among network operators and enterprises about their about their current vulnerabilities.

Post-quantum cryptography (PQC) is a suite of advanced asymmetric cryptographic algorithms that cannot be broken by quantum computers. PQC aims to create cryptographic frameworks that safeguard against both quantum and classical computing threats, while ensuring seamless interoperability with existing communication protocols and network infrastructures.

Today, many networks rely on public key infrastructure (PKI) for the generation and management of encryption keys. PQC seeks to revolutionize this by modifying the underlying mathematical methods used by these ciphers. PQC is an element in creating  quantum-safe networks which are designed to be secure against attacks from CRQC. It achieves this by using Quantum-Safe cryptography ensuring security even against these advanced technologies. Its defense-in-depth strategy layers multiple cryptographic techniques, making it far more difficult for threat actors to breach the network.

What are harvest now, decrypt later attacks?

Harvest now, decrypt later (HDML) is an attack in which cybercriminals collect and store encrypted data, anticipating the eventual availability of quantum computers. While quantum technology might still be years away, this threat underscores the urgent need to prepare now. Delaying the implementation of quantum-resistant cryptography and strategies could leave data vulnerable in the future.

While network operators and enterprises might consider delaying their preparations, cybercriminals are not waiting—they are already exploiting vulnerabilities and stealing vast amounts of encrypted data. To defend against HNDL attacks, organizations must strive to become more crypto-agile. A well-designed and meticulously managed public key infrastructure (PKI) will facilitate a seamless transition to quantum-resistant algorithms once standards are established.

Are there standardized PQC algorithms?

In August 2024, the National Institute of Standards and Technology (NIST) announced the formal publication of its first set of PQC algorithms since the standardization process began in 2016.

The new approved standards are designed for two vital encryption roles: securing information shared across public networks and authenticating identities with digital signatures.

  • CRYSTALS–KYBER
    • This algorithm is the primary standard for general encryptions. Advantages include small encryption keys that two parties can exchange easily and its speed of operation
  • CRYSTALS–Dilithium
    • This algorithm is the primary standard for protecting digital signatures
  • SPHINCS+
    • This algorithm is also designed for digital signatures but is based on a different mathematical approach and serves as a backup method in case CRYSTALS–Dilithium proves vulnerable
  • FALCON
    • To be finalized in late 2024

This is a groundbreaking moment for post-quantum cryptography (PQC). With NIST’s approval of these algorithms, they’re set to become integral to industry standards (IETF, 3GPP) for internet, network, and data encryption.

Eager to dive deeper into cybersecurity? Visit our AI in Security and Cybersecurity Regulations pages for comprehensive insights and the latest developments.

Related topics

Related products and services

Product

5G cybersecurity orchestration and incident response software suite to detect, analyze, and mitigate telco security risks faster.

Please complete the form below.

The form is loading, please wait...

Thank you. We have received your inquiry. Please continue browsing.