Embracing Post-Quantum Cryptography in the Quantum Era
What is post-quantum cryptography (PQC) and how does it work?
Quantum computers utilize cutting-edge technology to solve complex problems that are beyond the capabilities of classical computers. Although most experts believe that a Cryptographically Relevant Quantum Computer (CRQC), capable of breaking classical encryption keys, is still years away, the threat of 'harvest now, decrypt later' (HNDL) attacks is already causing concern among network operators and enterprises about their about their current vulnerabilities.
Post-quantum cryptography (PQC) is a suite of advanced asymmetric cryptographic algorithms that cannot be broken by quantum computers. PQC aims to create cryptographic frameworks that safeguard against both quantum and classical computing threats, while ensuring seamless interoperability with existing communication protocols and network infrastructures.
Today, many networks rely on public key infrastructure (PKI) for the generation and management of encryption keys. PQC seeks to revolutionize this by modifying the underlying mathematical methods used by these ciphers. PQC is an element in creating quantum-safe networks which are designed to be secure against attacks from CRQC. It achieves this by using Quantum-Safe cryptography ensuring security even against these advanced technologies. Its defense-in-depth strategy layers multiple cryptographic techniques, making it far more difficult for threat actors to breach the network.
Quantum security
Explore how quantum security reshapes the future of telecom.
What are harvest now, decrypt later attacks?
Harvest now, decrypt later (HDML) is an attack in which cybercriminals collect and store encrypted data, anticipating the eventual availability of quantum computers. While quantum technology might still be years away, this threat underscores the urgent need to prepare now. Delaying the implementation of quantum-resistant cryptography and strategies could leave data vulnerable in the future.
While network operators and enterprises might consider delaying their preparations, cybercriminals are not waiting—they are already exploiting vulnerabilities and stealing vast amounts of encrypted data. To defend against HNDL attacks, organizations must strive to become more crypto-agile. A well-designed and meticulously managed public key infrastructure (PKI) will facilitate a seamless transition to quantum-resistant algorithms once standards are established.
Are there standardized PQC algorithms?
In August 2024, the National Institute of Standards and Technology (NIST) announced the formal publication of its first set of PQC algorithms since the standardization process began in 2016.
The new approved standards are designed for two vital encryption roles: securing information shared across public networks and authenticating identities with digital signatures.
- CRYSTALS–KYBER
- This algorithm is the primary standard for general encryptions. Advantages include small encryption keys that two parties can exchange easily and its speed of operation
- CRYSTALS–Dilithium
- This algorithm is the primary standard for protecting digital signatures
- SPHINCS+
- This algorithm is also designed for digital signatures but is based on a different mathematical approach and serves as a backup method in case CRYSTALS–Dilithium proves vulnerable
- FALCON
- To be finalized in late 2024
This is a groundbreaking moment for post-quantum cryptography (PQC). With NIST’s approval of these algorithms, they’re set to become integral to industry standards (IETF, 3GPP) for internet, network, and data encryption.
Eager to dive deeper into cybersecurity? Visit our AI in Security and Cybersecurity Regulations pages for comprehensive insights and the latest developments.
Related topics
Related products and services
Solution
Cloud-native Extended Detection and Response
Product
Automate the lifecycle management of your security certificates
Product
5G cybersecurity orchestration and incident response software suite to detect, analyze, and mitigate telco security risks faster.
Product
Designed for mission critical infrastructures.
Service
Leading holistic security advisories for critical networks
Service
Your trusted partner for protecting you against 5G security threats in the digital era
Learn more
Article
Customer success
Customer success
Report
Please complete the form below.
The form is loading, please wait...
Thank you. We have received your inquiry. Please continue browsing.