Preparing for Quantum Computing: A Roadmap for Cybersecurity
This article is published in accordance with the information provided by CISA.
Introduction: Quantum computing is on the horizon, and it poses a significant threat to cybersecurity. CISA, NSA, and NIST are urging organizations, especially those responsible for Critical Infrastructure.
Why Prepare Now?
- Long-Term Data Protection: Data that needs safeguarding today may still require protection when quantum computers become more prevalent.
- Catch and Break Strategy: Malicious actors might intercept data today, knowing they can decrypt it later with quantum computers.
- Outdated Encryption: Many current encryption methods, like RSA and ECDSA, are vulnerable to quantum attacks and need substantial updates.
Establish a Quantum-Readiness Roadmap:
- Project Teams: Set up teams to plan your transition to post-quantum cryptographic (PQC) standards.
- Cryptographic Discovery: Identify systems and assets using quantum-vulnerable encryption, including digital signatures and software updates.
- Inventory: Create a list of quantum-vulnerable tech and assess the importance of the associated data.
- Prioritize Migration: Determine which systems and data need protection from quantum threats.
Prepare a Cryptographic Inventory:
- Visibility: Understand where your organization uses cryptography, from network protocols to end-user systems.
- Quantum-Vulnerable Algorithms: Identify areas where quantum-vulnerable algorithms are in use.
- Vendor Collaboration: Work with vendors to uncover embedded cryptography in their products.
Discuss Post-Quantum Roadmaps with Technology Vendors:
- Vendor Engagement: Ask vendors about their plans for transitioning to post-quantum cryptography.
- Contract Considerations: Ensure contracts allow for the adoption of quantum-resistant technology.
Technology Vendor Responsibilities:
- Integration Testing: Vendors should prepare to integrate post-quantum cryptographic algorithms into their products.
- NIST Standards: Review draft PQC standards from NIST and get ready to support them.
In conclusion, quantum computing is a game-changer for cybersecurity, and preparation is key to safeguarding sensitive data in the quantum era. CISA, NSA, and NIST provide essential guidance for organizations to navigate this challenging transition successfully.
I have published the same on my linkedin as well.