To stay ahead of emerging threats, federal agencies must proactively adapt their cryptographic systems to withstand future quantum computing capabilities. This strategy outlines how automated tools can help ensure a smooth and effective transition to post-quantum cryptography.
Why It Matters
The Cybersecurity and Infrastructure Security Agency (CISA) has developed a strategic approach to support Federal Civilian Executive Branch (FCEB) agencies in transitioning to post-quantum cryptography (PQC). The promulgated this strategy in a document titled “Strategy for Migrating to Automated Post-Quantum Cryptography Discovery and Inventory Tools“. The threat posed by cryptographically-relevant quantum computers (CRQCs) demands proactive measures to protect cryptographic systems. (We’ve been reporting on the need for migrating to the post-quantum world for quite a while). This strategy helps agencies assess their progress toward PQC adoption by utilizing automated tools that inventory and identify quantum-vulnerable cryptographic assets. The implications are significant: quantum computing advancements could potentially break widely-used encryption algorithms, posing risks to critical federal data. This strategy helps mitigate those risks and ensures preparedness for a post-quantum future.
Key Points
- Purpose: The strategy aims to facilitate FCEB agencies in assessing their progress toward PQC adoption. Automated cryptography discovery and inventory (ACDI) tools are central to this effort.
- Background: National Security Memorandum 10 and OMB Memorandum 23-02 emphasize the urgency of transitioning to PQC to counter future threats posed by quantum computers. The strategy aligns with these directives, focusing on safeguarding cryptographic systems crucial for national security.
- Goals: Key objectives include using ACDI tools to create comprehensive cryptographic inventories, integrating these tools with Continuous Diagnostics and Mitigation (CDM) programs, and reducing resource demands through automation.
- Approach: Agencies are instructed to inventory data across three methods—automated tools like ACDI, existing CDM capabilities, and manual collection where needed. CyberScope remains the primary tool for reporting cryptographic assets and vulnerabilities.
- On-Going Research: There are still uncertainties regarding the detection capabilities of current automated tools, particularly for embedded cryptographic algorithms. CISA collaborates with NIST and industry partners to advance tool capabilities and refine inventory methodologies.
What’s Next
The timeline for migrating to PQC spans several years. Initial steps include a pilot program to integrate ACDI tools with CDM capabilities, followed by ongoing assessments and updates to CyberScope and other reporting mechanisms. Agencies are expected to begin deployment of updated tools as they become available, with full migration efforts extending into the late 2020s. CISA will continue monitoring progress and offer support to agencies struggling with the transition.
Further Reading
For detailed guidance on implementing PQC and CISA’s recommendations, refer to the NIST Special Publication (SP) 1800-38.
For Additional Insights See
About the Author
Bob Gourley
Bob Gourley is an experienced Chief Technology Officer (CTO), Board Qualified Technical Executive (QTE), author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity and data analytics. CTO of OODA LLC, a unique team of international experts which provide board advisory and cybersecurity consulting services. OODA publishes OODALoop.com. Bob has been an advisor to dozens of successful high tech startups and has conducted enterprise cybersecurity assessments for businesses in multiple sectors of the economy. He was a career Naval Intelligence Officer and is the former CTO of the Defense Intelligence Agency.
Subscribe to OODA Daily Pulse
The OODA Daily Pulse Report provides a detailed summary of the top cybersecurity, technology, and global risk stories of the day.