Post-Quantum Cryptography

Despite large scale quantum computing being several years away from being a practical reality, federal government experts are deservedly concerned about the cybersecurity implications today.

Federal agencies need to start their quantum safe transition strategy now.

This was underscored in May 2022, when the National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (NSM 10) provided requirements and timelines for Quantum-Resistant Cryptography. In particular, the memo notes that “America must start the lengthy process of updating our IT infrastructure today to protect against this quantum computing threat tomorrow.”

The memo continues by underscoring that, “Central to this migration effort will be an emphasis on cryptographic agility, both to reduce the time required to transition and to allow for seamless updates for future cryptographic standards.”

Today’s non-PQ (post-quantum) encryption absolutely will break (or be broken) in the future, affecting security aspects such as authentication, code-signing, and digital signatures.

The Quantum Challenge: Data’s Necessary Expiration Date

Today’s encrypted data has an expiration date. All data that is encrypted today using classic PKI-based cryptography is quantum vulnerable, with little if any protection against potential vulnerabilities that may become apparent later. Meanwhile, however, all of that data also has a time for which it must remain secure.

The data that we encrypt today is already decaying, because its risk of exposure increases over time. When encrypted data (using current algorithms) is transmitted over the network it becomes vulnerable to interception. Anyone with access to that data through surveillance, eavesdropping, or hacking can harvest the data and store it until such a time that a quantum computer can decrypt it.

Recommended Quantum Safe Transition Strategy

When preparing for a quantum-safe encryption strategy, there are four things to keep in mind:

1. Quantum is coming. National Security Memo 10 emphasized the United States’ commitment to continued technological and scientific leadership in quantum computing. Alongside the potential benefits of quantum computing are the acknowledged risks to the economy and national security since quantum computing will make PKI-based classic cryptography obsolete. NIST has recently concluded a six-year effort and announced its selection of four quantum-safe algorithms designed to resist attacks from future quantum computers.

2. Know your risks. As we’ve already explained, long-term data is at risk to harvesting and early attacks. IT managers and other network professionals must assess their organizations’ use of vulnerable cryptography, the expiration date of their encrypted data, and the crypto-agility maturity of their IT infrastructure.

Several sources are available to understand risks and to plan ahead. NIST offers a publication titled “Getting Ready for Post-Quantum Cryptography” to help monitor standards development, and perform risk assessment of where public-key crypto may be used in the infrastructure. It’s essential to understand whether a network’s equipment is crypto-agile.

The National Cybersecurity Center of Excellence (NCCoE) has recently launched its “Migration to Post Quantum Cryptography” Project. Understanding that replacement of cryptographic algorithms is both technically and logistically challenging, the NCCoE is undertaking a practical demonstration of technology and tools that can provide a head start on executing a migration roadmap in collaboration with a public and private sector community. Thales Trusted Cyber Technologies is among the handful of technology collaborators selected to participate in this project.

Another excellent source of information is the NSA Post-Quantum Cryptography FAQ, which provides an excellent summary on the subject.

3. Focus on crypto-agility. This requires flexible upgradeable technology and a hybrid approach of classic and quantum-resistant crypto solutions.

Remember that crypto-agility is not about quantum; it’s about being able to face the reality that all algorithms fail with time. Many systems today make it difficult to rotate keys, to choose different sizes/parameters, and to change mechanisms or key algorithms. These are all required for protocols to be versioned, negotiated and not to fail when presented with unknown options. They are essential for crypto-agility, and it’s important to work with providers with solutions that embrace those needs.

4. Start today. This cannot be under-stated, which is why National Security Memo 10 made a point of it. Organizations must begin to design a quantum-resistant architecture today to protect against the emerging quantum threat. With IT infrastructure equipment often being deployed for years or decades without hardware replacement, it is important to make sure currently deployed hardware was developed with crypto-agility principles in mind, to receive software or firmware updates once post-quantum crypto algorithms and protocols are standardized. It is also important to check with equipment providers to see what beta or technology preview firmware they have available for testing in non-production systems, that implements pre-standardized quantum-resistant cryptographic algorithms. Testing will help identify performance or interoperability issues early and provide time to address the issues and mitigate the identified risks.

Securing the Future: Navigation Post Quantum Cryptography Standards

Thales TCT joins NG/FCW and government leaders to share actionable strategies and resources for navigating this evolving landscape, empowering organizations to safeguard against emerging cyber risks. This discussion will explore the latest initiatives, offering practical insights on implementing PQC standards to protect sensitive data.

Thales TCT Quantum-Ready Solutions

Luna T-Series HSMs are the choice for government agencies when storing, protecting and managing cryptographic keys used to secure sensitive data and critical applications. Meeting government mandates for U.S. Supply Chain, the high-assurance, crypto-agile, tamper-resistant Luna T-Series HSMs are designed, developed, manufactured, sold, and supported in the United States.

Protect Encryption Keys with T-Series Luna Hardware Security Modules

Quantum Resistant Algorithms

Luna T-Series HSMs (v 7.13.0 forward) now include pre-standards implementations of NIST-selected PQC algorithms and stateful hashed-based signature algorithms.

The algorithms supported are:

  • CRYSTALS-Dilithium (ML-DSA)
  • CRYSTALS-KYBER (ML-KEM)
  • FALCON (FN-DSA)

Additionally, Thales TCT is introducing the Leighton-Micali Signature (LMS) stateful hash-based signature mechanism, along with its multi-tree variant, the Hierarchical Signature Scheme (HSS).  LMS/HSS enables customers to transition to quantum-resistant firmware/software signing.  The Luna T-Series HSM implementation of LMS is compliant with SP 800-208 and PKCS#11 v3.1.

Quantum Enhanced Keys

By embedding a quantum random number generator (QRNG) chip within the Luna HSM, Thales TCT is offering the industry’s first FIPS 140-2 compliant HSM capable of generating quantum enhanced keys. Using principles of quantum physics, the QRNG chip produces high quality entropy which is the basis for all random numbers and cryptographic keys generated by the HSM.  With a choice of operating the HSM in FIPS-approved mode using either the embedded, classic physical RNG or the embedded quantum RNG, customers can dynamically change between classical key generation and quantum enhanced keys as threats emerge over time.

LEARN MORE ABOUT QUANTUM ENHANCED KEYS

Quantum Random Number Generation

QRNG complements post quantum cryptography and is part of a crypto-agile strategy. Thales TCT’s Luna T-Series HSMs contain an embedded QRNG chip for high quality entropy based on quantum noise.

All keys and random numbers generated within the HSM are enhanced by the security of the quantum random numbers that are the foundation of the key generation process.

Secure Data in Transit with High Speed Encryptors (HSE)

Quantum Resistant Algorithms

Thales HSEs include a framework to support QRA via firmware upgrade. Thales HSE solutions support all four NIST Quantum Resistant Public Key algorithms (finalists) in all products (plus other non-finalist algorithms).

Quantum Key Distribution

Thales HSEs are quantum-ready and QKD compatible for more than a decade.

Quantum Random Number Generation

Quantum Random Number Generation is integrated into the HSE solution.

CN6100

Thales HSE network encryption solutions support Post-Quantum Cryptography with a crypto-agile, FPGA-based architecture.

Featured Resources

On Demand GovLoop Webinar: Taking a Realistic Look at Quantum Computing in Government
GovLoop Video: Quantum-Safe Encryption: Understanding the What, Why and How
CTO Sessions On Demand: Best Practices for Implementing Quantum-Resistant Security
FedNewsNetwork Video Interview: Preparing for the intersection of AI, quantum computing

Resources

ImageTitleLink
Washington Technology Commentary: Why post-quantum security planning must start today
GovLoop Blog Post: Quantum-Safe Encryption: What It Means, and Why Agencies Should Care
On Demand GovLoop Webinar: Taking a Realistic Look at Quantum Computing in Government
GovLoop Video: Quantum-Safe Encryption: Understanding the What, Why and How
Govloop Video Interview: Quantum-Safe Encryption: What It Means, and Why Agencies Should Care
CTO Sessions On Demand: Best Practices for Implementing Quantum-Resistant Security
Securing the Future: Navigation Post Quantum Cryptography Standards
FedNewsNetwork Video Interview: Preparing for the intersection of AI, quantum computing
FedNewsNetwork Commentary: Preparing for the intersection of AI, quantum computing
Blog Post: PQC Standards Released – Start Today
CTO Sessions: Quantum Resistant Security
The Dual Faces of Quantum Computing: Opportunities and Threats in National Security
CTO Sessions Webcast: Word on the Street – 2024’s Top Tech Trends
White Paper: Quantum Resistant Code Signing Secured by Hardware Security Modules
CTO Sessions On Demand: Are You Quantum Ready?
Quantum Enhanced Keys Solution Brief