
Believe the Hype About Quantum Security: Report
www.technewsworld.com
Believe the Hype About Quantum Security: ReportBy John P. Mello Jr.March 11, 2025 5:00 AM PT ADVERTISEMENTAchieve Financial Clarity with SettleGetting accurate product cost data is crucial for growth. Settle unifies invoices, payments, and inventory to help e-commerce operators uncover true costs and boost margins -- all in one platform. Get Started Today! A call for organizations to take quantum security seriously has been sounded in a new report by Forrester Research.The report titled Quantum Security Isnt Hype Every Security Leader Needs It acknowledged that the commercial availability of quantum computers that can crack traditional asymmetric cryptography is still five to 10 years away. However, it added that organizations must assess and prepare for the impact of quantum security now.While the encryption market has a history of vendors publishing incredible claims like unbreakable encryption, the hype and interest around quantum is real because hackers are already using the harvest now, decrypt later approach, noted the report written by research director Merritt Maxim and analysts Andras Cser, Sandy Carielli, and Heidi Shey.Organizations need to start preparing now to secure their resources from attacks from quantum computers since it will take them years to do it because the transition wont be totally under their control, explained Carielli. Theres a lot of reliance on third parties, she told TechNewsWorld, and reliance on vendors upgrading their technology so you can upgrade yours.There are a lot of steps along the way, she continued, so I think youre talking in terms of numbers of years, and thats why weve always been saying start now, even if this is not something that will come into play for another five or 10 or whatever years. It will potentially take that long to complete the migration.Harvest Now, Decrypt LaterJamie Boote, associate principal security consultant at Black Duck Software, an applications security company in Burlington, Mass., asserted that quantum computing would disrupt decades-old conventions in terms of how well current encryption algorithms can safeguard sensitive data.An entire generation of professionals has lived with the slow cycling of encryption algorithms in and out as computers grew faster at a predictable rate, and this is going to throw that cadence away, he told TechNewsWorld. This change isnt going to be instant, and its not going to be easy, but the more we can prepare our infrastructure to just work in the post-quantum computing era, the fewer incidents stemming from unmaintained or older components will occur.Theres a saying that The best time to plant a shade tree was twenty years ago, the second-best time is today, but right now, were living at a point where it is the best time to plant that metaphorical shade tree of security to enjoy the benefits when the time is right, he added.Organizations should also be getting their quantum security efforts into gear because harvest now, decrypt efforts are being conducted by nation-states and cybercriminals. Industries that have data that needs to remain private for years into the future are at most risk of harvest now, decrypt later, explained Rebecca Krauthamer, co-founder and CEO of QuSecure, a maker of quantum-safe security solutions, in San Mateo, Calif.When it comes to data like national security information, bank account information, data thats valuable year after year when a quantum computer does come online, it can decrypt that stockpiled data, she told TechNewsWorld. Thats why we see governments and banks moving very quickly to start addressing the quantum threat, even though there is no quantum computer that exists today that will break todays encryption.Valuable ExercisePreparing for Q-Day even if it never arrives can be an incredibly valuable exercise, maintained Richard Stiennon, founder and chief research analyst at IT-Harvest, a cybersecurity industry analyst firm in Birmingham, Mich.You should be doing it anyway, he told TechNewsWorld. You should be discovering all the places you have encrypted data. That will tell you where your family jewels are. And itll tell you the size and scope of problems youve got.Now youve probably got all this encrypted data all over the place, he said. You dont know who owns the keys or how to get to them. Theyre probably insecure. Theyre probably old and need to be re-keyed. So, you have to think about getting your hands around this, right? How do you find all the encrypted data? Find the way its encrypted so you can decrypt and re-encrypt it if you need to?When you talk to some end users, they dont know whats being protected by cryptography, added Heather West, senior research analyst at IDC, a market research company in Framingham, Mass. For some, its a mixture of different types of solutions, she told TechNewsWorld. Some have band-aid solutions. Some just dont know. So, you first need to understand what data and infrastructure are most at risk. Then you need to know what youre doing to protect it and figure out which post-quantum cryptography algorithms would be best suited for protecting it.However, Luigi Caramico, co-founder and CTO of DataKrypto, a cloud encryption company in Burlingame, Calif., warned against investing too much effort today in quantum-resistant solutions.An encryption method considered quantum-proof today may not remain secure in the future, he told TechNewsWorld. Instead, I would prioritize addressing present-day vulnerabilities, such as the encryption gap the need to decrypt when its in use which poses an immediate and tangible risk to data security.Investing heavily in todays quantum-proof solutions could also be risky, he added. Some of these algorithms may eventually be found vulnerable to classical attacks, let alone quantum ones. A better strategy is quantum agility ensuring cryptographic systems can be updated as stronger and more thoroughly vetted algorithms emerge.Quantum Security Demands Crypto-AgilityQuantum security and crypto-agility the ability to replace and upgrade cryptographic algorithms in infrastructure, commercial and in-house-built applications will improve the security of any information exchange, improve digital signatures, and mitigate the risk of harvest now, decrypt later attacks, the Forrester report noted.Quantum security will force an overhaul of systems across an organization, and organizations will need to upgrade their entire security stack to ensure crypto-agility for the future to protect their data, it added.Crypto-agility is crucial in todays fast-evolving digital environment, where new technologies, algorithms, and security challenges require constant adaptation, said Tim Callan, chief compliance officer at Sectigo, a global digital certificate provider. This need for agility will become even more critical as we approach the PQC [Post Quantum Computing] era, with the potential for rapid algorithm deprecation, he told TechNewsWorld.Because algorithmic trust is imperfect, organizations must use this opportunity to design security that is modular and enable algorithms to easily be swapped in and out like security Legos, Matt Mittelsteadt, a research fellow at the Cato Institute, a Washington, D.C., think tank, told TechNewsWorld.If any of these algorithms are found insecure, which is indeed possible, organizations that design with modularity in mind will be able to quickly swap in a replacement and maintain security, he said.Trillion-Dollar RiskThe Forrester report is exactly right about the threat of quantum computers, asserted Stefan Leichenauer, vice president of engineering at SandboxAQ, a developer of B2B and quantum software in Palo Alto, Calif.In as little as five years, we could see a quantum computer crack traditional cryptography, and because of hack now, decrypt later attacks, the vulnerability exists today, he told TechNewsWorld.Even if we have doubts about whether a quantum computer will arrive in that timeframe maybe you think its only a 10% chance a modest probability of a trillion-dollar-loss event is still a big problem, he said.Weve seen a number of recent announcements from the quantum computing industry showing that the roadmap is advancing, so our confidence that quantum computers are coming has only gone up, he added.Every organization needs to evaluate their cryptographic posture, which begins with a careful inventory of their use of encryption and then a crypto-agile migration to post-quantum key exchanges. Its a multi-year process, so the time to start is now.John P. Mello Jr. has been an ECT News Network reporter since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the Boston Phoenix, Megapixel.Net and Government Security News. Email John.Leave a CommentClick here to cancel reply. Please sign in to post or reply to a comment. New users create a free account.Related StoriesMore by John P. Mello Jr.view allMore in Cybersecurity
0 Comments
·0 Shares
·44 Views