Preparing for Quantum Computing: A Roadmap for Cybersecurity

Suresh Shanmugam
2 min readAug 30, 2023

--

Image credit: https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3498776/post-quantum-cryptography-cisa-nist-and-nsa-

This article is published in accordance with the information provided by CISA.

Introduction: Quantum computing is on the horizon, and it poses a significant threat to cybersecurity. CISA, NSA, and NIST are urging organizations, especially those responsible for Critical Infrastructure.

Why Prepare Now?

  • Long-Term Data Protection: Data that needs safeguarding today may still require protection when quantum computers become more prevalent.
  • Catch and Break Strategy: Malicious actors might intercept data today, knowing they can decrypt it later with quantum computers.
  • Outdated Encryption: Many current encryption methods, like RSA and ECDSA, are vulnerable to quantum attacks and need substantial updates.

Establish a Quantum-Readiness Roadmap:

  • Project Teams: Set up teams to plan your transition to post-quantum cryptographic (PQC) standards.
  • Cryptographic Discovery: Identify systems and assets using quantum-vulnerable encryption, including digital signatures and software updates.
  • Inventory: Create a list of quantum-vulnerable tech and assess the importance of the associated data.
  • Prioritize Migration: Determine which systems and data need protection from quantum threats.

Prepare a Cryptographic Inventory:

  • Visibility: Understand where your organization uses cryptography, from network protocols to end-user systems.
  • Quantum-Vulnerable Algorithms: Identify areas where quantum-vulnerable algorithms are in use.
  • Vendor Collaboration: Work with vendors to uncover embedded cryptography in their products.

Discuss Post-Quantum Roadmaps with Technology Vendors:

  • Vendor Engagement: Ask vendors about their plans for transitioning to post-quantum cryptography.
  • Contract Considerations: Ensure contracts allow for the adoption of quantum-resistant technology.

Technology Vendor Responsibilities:

  • Integration Testing: Vendors should prepare to integrate post-quantum cryptographic algorithms into their products.
  • NIST Standards: Review draft PQC standards from NIST and get ready to support them.

In conclusion, quantum computing is a game-changer for cybersecurity, and preparation is key to safeguarding sensitive data in the quantum era. CISA, NSA, and NIST provide essential guidance for organizations to navigate this challenging transition successfully.

I have published the same on my linkedin as well.

--

--

No responses yet