Post-Quantum Computing Cryptography Is Now Real – What Is It and How Does It Affect Us?

by | Sep 19, 2022

Coviant Software isn’t competing for the honor of developing a new, NIST-approved, quantum-resistant encryption algorithm, but we are following developments closely. We are fascinated by developments toward the day when quantum computing is viable, and want to be prepared for the eventuality because, while not yet an operational reality, the security implications for a post-quantum world are dire. And some industry experts are predicting that day could be as soon as five years.

The cryptographic standards the world relies on today are very secure. Mathematicians have posited that it would take a trillion years to crack current public key cryptography. But when quantum computing becomes a reality, those algorithms could fall in a matter of days. That kind of computing power is astounding. And even if quantum computing resources are not widely available at first, the potential that a state-sponsored threat group could have access to such powerful resources means that taking steps to be prepared in advance is imperative to the protection of sensitive information.

Threat Actors are Preparing. You Should, Too

Don’t think that those cybercriminal organizations aren’t making their own preparations. It is widely believed that encrypted files are being harvested and stored for a time when they can be unlocked, and their contents accessed. Sensitive information with a long shelf-life, including intellectual property, military and government secrets, and personally identifiable information that is safe today could be easily deciphered tomorrow.

Because of that threat to the world’s cryptography standards, post-quantum crypto standards are being developed. As mentioned, NIST is holding a contest of sorts to find a potential successor to today’s standards, and other organizations are working independently on their own algorithms. Microsoft has a post-quantum crypto project ongoing, and OpenSSH 9.0, released April 2022, includes the NTRU Prime key exchange algorithm, believed to be safe against post-quantum threats. What do these cryptography developments mean for information security?

See You There!

That is the topic of a session taking place at the Techno Security & Digital Forensics Conference in San Diego on October on Monday, October 10 at 4pm PT entitled, Post-Quantum Computing Cryptography Is Now Real – What Is It and How Does It Affect Us?

Hosted by Coviant Software CEO Greg Hoffer, the session will look at the current state of quantum computing, discuss the security implications for a post-quantum world, and examine the steps organizations can take today to prepare for that looming eventuality.

If you plan to attend the conference, please consider signing up for this fascinating session.

#QuantumComputing #Cryptography #CoviantSoftware