Transitioning to Quantum-Safe Encryption (2024)

Encryption is the foundation of the internet.Encryption plays a critical foundational role in nearly everything we do today with computers on the internet.

Ever since the creation of the SSL Internet Protocolby Taher Elgamal while he was working as Chief Scientist at Netscape Communications, we have been able to use the internet securely to connect with websites, companies, and people. Over the years, SSL has been upgraded to Transport Layer Security (TLS) using asymmetric encryption to increase security further using algorithms such as RSA, Diffie Hellman, and Elliptic Curve.

We use these algorithms to protect all communications and take great care in issuing credentials and managing them between the parties that need to exchange data, such as user access to the Delinea Platform and Delinea Secret Server, and for Distributed Engine communications to the Delinea Platform.

Additionally, we use symmetric key encryption, such as the Advanced Encryption Standard (AES,) to securely store information at rest so the symmetric key holder can encrypt and decrypt data. Delinea Secret Server uses AES-256 encryption to ensure that data stored within its vault is protected and that only users with sufficient privileges can access an individual Secret.

Thus, the encryption process, keys, and algorithms are critical elements of our security and trust fabric. We must continually strive to mitigate the risk of compromise to ensure that Delinea's products can protect sensitive customer systems and data against any cyber threat.

Quantum computers—innovation enabler or cybersecurity threat?

The advent of quantum computers represents a monumental leap in computational capability beyond classical super-computing, which promises to help solve some of the most complex problems for scientists and businesses. Quantum computers are available for use today from several sources, including IBM, Microsoft Azure, AWS, and GCP, to name a few. While quantum computers provide a new way to solve complex problems, threat actors can also use them to break our current cryptography due to their speed and unique capabilities.

Quantum computers provide a new way to solve complex problems, but threat actors can also use them to break our current cryptography

The question on everyone's lips is whether a sufficiently large-scale quantum computer can break these traditional encryption algorithms, and when.

As early as 1994, Peter Shor discovered that quantum computers could break our current public key encryption algorithms because they could rapidly find the prime factors that make up the private key, and then break the encryption. While threat actors can theoretically use Shor's algorithm to achieve this, massive-scale quantum computers that are unavailable today are required.

When might such compute power be available?

Nevin's Law says that quantum computing power is experiencing doubly exponential growth (i.e., growth by powers of powers of two) relative to conventional computing (i.e., doubling processing power every two years per Moore's Law.) Thus, it's only a matter of time until we see quantum computers with sufficient power to break public key encryption.

On a promising note, quantum computing is not ideal for solving every problem. It's harder to crack symmetric encryption than asymmetric encryption, which is counter-intuitive given the challenge of factoring prime numbers with the latter method. Symmetric encryption, like AES, is very strong. Very long keys make symmetric encryption impervious to cracking. Gaining unauthorized access requires stealing or guessing the symmetric encryption key. Guessing is impractical due to the size of the key space.

Grover's algorithm is a quantum algorithm for unstructured data that provides a quadratic speedup in the computation over classical computing. This can result in AES-128 being feasible to crack, but AES-256 is still considered quantum resistant—at least until 2050, (as referenced throughout ETSI GR QSC 006 V1.1.1.)

Delinea's recommendation is to migrate any use of symmetric encryption using AES-128 to AES-256.

Cryptography in a post-quantum world

Quantum computer manufacturers are working hard to increase the performance and scale of their systems to help solve even more complex problems and advance innovation. Given the inevitable scaling of quantum computers and advances in mathematical algorithms, we will eventually see quantum computers break our current encryption. So, we need to plan for ongoing crypto algorithm changes within our systems since the quantum-safe algorithms continue to be developed, improved, and tested.

NIST has been working on Post-Quantum Cryptographic Algorithms since 2016 and has four candidates for standardization as published in NIST IR 8413.

Additionally, there is a push throughout the US Federal government to migrate to Post-Quantum Cryptography, which started with the White House issuing Executive Order 14028 on "Improving the Nation's Cybersecurity" in May of 2021. In May 2022, National Security Memorandum 10 (NSM-10) published "On Promoting United States Leadership in Quantum Computing While Mitigating Risk to Vulnerable Cryptographic Systems." The Office of Management and Budget (OMB) then issued Memorandum M-23-02, "Migrating to Post-Quantum Cryptography."

Delinea recommends that you inventory your use of cryptographic algorithms and prioritize the transition to Quantum-Safe Cryptography for the highest-value assets in your environment.

Delinea is embracing Quantum-Safe Cryptography

Over the last year, Delinea has been working with the NIST-approved CRYSTALS-Kyber algorithm to understand better how it works. We aim to determine places in our solutions where we can migrate seamlessly and gradually from traditional to quantum algorithms without adversely impacting the user experience or our products.

We generally found that we can use Kyber-1024 instead of AES-256 for data encryption with negligible impact on response time and Secret data storage. We are considering the use of Quantum-Safe Encryption as an extension of Secret Server's existing capabilities.

Delinea Secret Server adds an additional layer of security for more sensitive secrets. Only users with this enabled and the corresponding password can access the associated secrets. With this mechanism, users can protect their secrets from vault administrators. We're exploring enhancing this model, protecting secrets from quantum computer-based "store now, decrypt later" (SNDL) attacks. Vault users could then select which algorithm to use to protect their Secrets, either AES-256 or Kyber-1024.

Delinea recommends educating users on this protection feature and its contribution to protecting their more sensitive secrets and mitigating the risk of quantum computer-based SNDL attacks.

The risk quantum computing poses to existing encryption techniques is undeniable but not yet immediate. The practical use of quantum computing is still in its infancy, and it doesn't currently pose a significant threat to most existing encryption technologies.

However, to counter potential risks associated with quantum computing, solution providers should begin assessing options for algorithm migration. Similarly, consumers should incorporate requirements for such capabilities into their risk assessment process and evaluate their vendors' roadmaps to confirm they address such requirements in an acceptable timeframe.

Transitioning to Quantum-Safe Encryption (1)

Extend privileged access, everywhere, with Delinea Platform

Ensure least privilege best practices and improve your security posture across the enterprise, even as roles, permissions, and IT resources change.

Transitioning to Quantum-Safe Encryption (2024)

FAQs

Transitioning to Quantum-Safe Encryption? ›

The good news is that quantum-safe cryptography already exists. We are so confident in these new standards that we have already built them into IBM z16™ cloud systems, and are working with clients to integrate them into their security infrastructure.

What is the current status of quantum safe cryptography? ›

The good news is that quantum-safe cryptography already exists. We are so confident in these new standards that we have already built them into IBM z16™ cloud systems, and are working with clients to integrate them into their security infrastructure.

How safe is quantum encryption? ›

Even encrypted data that is safe against current adversaries can be stored for later decryption once a practical quantum computer becomes available. At the same time it will be no longer possible to guarantee the integrity and authenticity of transmitted information, as tampered data will go undetected.

How long until quantum computers break encryption? ›

Quantum basics

Our blog post explains in detail what a quantum computer is, how it works, and why it's so difficult to build. So far, all experts have agreed that a quantum computer large enough to crack RSA would probably be built no sooner than around a few dozen decades.

What will replace RSA? ›

A post-quantum, HIPAA compliant, end-to-end, patent-free, export-free, secure online solution, is being created, based on ZSentry as used from 2004 to 2014, to replace RSA. One needs a quantum-resistant algorithm, because all existing public-key encryption can be broken.

What is the problem with QKD? ›

It cannot be implemented in software or as a service on a network, and cannot be easily integrated into existing network equipment. Since QKD is hardware-based it also lacks flexibility for upgrades or security patches.

Will quantum break RSA? ›

Yes, at least for now. To break RSA we need a few thousand perfect qubits, however, the qubits we currently have are imperfect. Indeed, using the currently available qubits will require about 20 million of them.

Can QKD be hacked? ›

However, a practical QKD system may behave differently from its theoretical model which discloses security loopholes that can be exploited by an eavesdropper, Eve, to learn the secret key, compromising the practical security of QKD systems [12–24].

Is AES 256 quantum safe? ›

Grover's algorithm is a quantum algorithm for unstructured data that provides a quadratic speedup in the computation over classical computing. This can result in AES-128 being feasible to crack, but AES-256 is still considered quantum resistant—at least until 2050, (as referenced throughout ETSI GR QSC 006 V1. 1.1.)

Can quantum cryptography be broken? ›

The hope is that quantum computers will not break these four algorithms, he says, although there is always that possibility. According to Moody, no one can guarantee that no one will ever develop a smart new attack that could break a post-quantum cryptographic algorithm.

Why did NASA stop quantum computing? ›

The abrupt shutdown of NASA's quantum computing project was triggered by an unforeseen incident during a routine test. During the analysis of a complex simulation, the quantum computer demonstrated unprecedented computational power, solving a previously intractable problem.

Can AES be cracked by quantum computer? ›

Because 128 bit security is still adequate, a quantum computer cannot break 256 bit AES. However a quantum computer could still cause big problems for the public key algorithms (like elliptic curves) that are necessary to exchange symmetric keys for AES based secure channels.

What happens to encryption after quantum computing? ›

As such, quantum computers have the potential to render current encryption methods vulnerable to attack, compromising the security of sensitive data. Thus, the threat becomes real when more powerful quantum computers are developed in the future, which could defeat commonly used encryption systems.

Will RSA become obsolete? ›

At the moment, RSA is still secure. NIST recommends a key length of at least 2048 bits, likely secure until 2030. A sufficiently powerful quantum computer would be able to break RSA, but no such quantum computer exists and there are serious engineering challenges to create one.

Is RSA key obsolete? ›

Key Takeaways

Microsoft is discontinuing Windows RSA keys shorter than 2048 bits to encourage the adoption of more robust encryption techniques for server authentication. Since 2013, internet standards and regulatory bodies have prohibited using 1024-bit keys, recommending 2048 bits or longer RSA keys.

What has replaced RSA? ›

The alternative to RSA and DH, these days is elliptic curve asymmetric key cryptography. Specifically ECDSA for the sign/verify and ECDH for the key exchange.

Is quantum cryptography used today? ›

Despite being so potentially powerful, quantum cryptography is rarely used today due to technology-related limitations. One quantum key requires a single-photon laser beam signal through a fiber optic cable. Only one photon goes through at a time, making this process slower than current communication methods.

What is the future of quantum cryptography? ›

By proactively adopting quantum-resistant cryptography, we can safeguard sensitive information from future quantum threats, ensuring the security of both current and historically stored digital communications and maintaining the integrity of digital infrastructure.

How secure is QKD? ›

QKD has provable security based on information theory, and forward secrecy. The main drawback of quantum-key distribution is that it usually relies on having an authenticated classical channel of communication.

Top Articles
Merchant Cash Advance Software Development Service | Chetu
How To Make Money As A Kid - 101 Best Kid Business Ideas
Celebrity Extra
Tv Guide Bay Area No Cable
10 Popular Hair Growth Products Made With Dermatologist-Approved Ingredients to Shop at Amazon
Videos De Mexicanas Calientes
Autobell Car Wash Hickory Reviews
What Was D-Day Weegy
Paketshops | PAKET.net
LeBron James comes out on fire, scores first 16 points for Cavaliers in Game 2 vs. Pacers
Azeroth Pilot Reloaded - Addons - World of Warcraft
Culvers Tartar Sauce
Immediate Action Pathfinder
Superhot Unblocked Games
Mail.zsthost Change Password
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Mzinchaleft
Beebe Portal Athena
Tygodnik Polityka - Polityka.pl
Mahpeople Com Login
How to Watch the Fifty Shades Trilogy and Rom-Coms
Ge-Tracker Bond
Dwc Qme Database
Ezel Detailing
Great Clips Grandview Station Marion Reviews
Mtr-18W120S150-Ul
Haunted Mansion Showtimes Near Epic Theatres Of West Volusia
Rogue Lineage Uber Titles
Dei Ebill
1773x / >
Teenbeautyfitness
Xemu Vs Cxbx
Best Weapons For Psyker Darktide
KITCHENAID Tilt-Head Stand Mixer Set 4.8L (Blue) + Balmuda The Pot (White) 5KSM175PSEIC | 31.33% Off | Central Online
Viewfinder Mangabuddy
Bella Thorne Bikini Uncensored
15 Best Things to Do in Roseville (CA) - The Crazy Tourist
Sabrina Scharf Net Worth
Hireright Applicant Center Login
3 bis 4 Saison-Schlafsack - hier online kaufen bei Outwell
Wilson Tire And Auto Service Gambrills Photos
Memberweb Bw
Tommy Bahama Restaurant Bar & Store The Woodlands Menu
Lyons Hr Prism Login
How the Color Pink Influences Mood and Emotions: A Psychological Perspective
Booknet.com Contract Marriage 2
Sacramentocraiglist
Lebron James Name Soundalikes
The Hardest Quests in Old School RuneScape (Ranked) – FandomSpot
Skyward Login Wylie Isd
Powah: Automating the Energizing Orb - EnigmaticaModpacks/Enigmatica6 GitHub Wiki
Att Corporate Store Location
Latest Posts
Article information

Author: Margart Wisoky

Last Updated:

Views: 5820

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Margart Wisoky

Birthday: 1993-05-13

Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

Phone: +25815234346805

Job: Central Developer

Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.