Start your day with intelligence. Get The OODA Daily Pulse.
NIST just released three new encryption standards. Security teams are already moving out to implement them in government and certain parts of industry. But there are things all business and government executives, including the non-technical leaders, should know about these new algorithms and what they mean for our collective future. This post captures what you need to know.
NIST is known for their ability to coordinate with a broad range of informed stakeholders. It is their superpower. Good coordination on standards can and should take a long time, and this new effort for new standards for Public-Key Post-Quantum Cryptographic Algorithms certainly took a long time. NIST was contemplating and conceptualizing the best action for about a decade, then in 2016 launched a formal call for nominations for new quantum safe algorithms. Now 8 years after the official launch of the effort, after extensive coordination and collaboration with security experts, academia, industry leaders and government experts domestically and internationally, the first of three new quantum safe algorithms have been announced.
The Most Important Point
The most important thing all executives should understand about the new algorithms just announced is that your organization will be required to run them. Government directives are mandating all government agencies transition to them, and soon all who contract with government will as well. Most large corporations are already poised to being their transition, and soon all in highly regulated industries will be required to comply by government regulation. Eventually every organization that partners with those other companies will also have to run them. And before long the compliance requirements will hit every company that holds data on any citizen. We will all have to comply.
The fact that your organization will comply means you can get a leg up on the competition by complying smartly. Do it efficiently, effectively and faster than the competition and use that to bring glory to your brand. It just takes a bit of planning to do this. We offer tips below that will help you do this.
Why Will This Transition Be Mandated
With continued breakthroughs in quantum computing research and development including breakthrough’s in error correction, nation’s will soon have access to computers powerful enough to break current forms of encryption. Data encrypted in old ways is already being collected by adversaries because they know one day they will be able to break it using quantum computers. It may be 5 years or more before computers can break current forms of encryption. But many types of data for many organizations will still have value 5 years from now and needs protection. NIST puts it this way:
In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks.
The question of when a large-scale quantum computer will be built is a complicated one. While in the past it was less clear that large quantum computers are a physical possibility, many scientists now believe it to be merely a significant engineering challenge. Some engineers even predict that within the next twenty or so years sufficiently large quantum computers will be built to break essentially all public key schemes currently in use. Historically, it has taken almost two decades to deploy our modern public key cryptography infrastructure. Therefore, regardless of whether we can estimate the exact time of the arrival of the quantum computing era, we must begin now to prepare our information security systems to be able to resist quantum computing.
What are the new algorithms and what do they do? These are Federal Information Processing Standards (FIPS). Specifically they are
One of these, FIPS 203, provides a way to wrap other encryption keys to keep them from being broken. The other two provide ways to sign data in ways that can reduce the threat of fraud in digital signatures. A fourth standard for key encryption is expected in the coming months.
Looking for a succinct video overview of these and other related topics? See our OODAcast with Vikram Sharma of QuintessenceLabs (and see their Guide to Quantum Risk).