Virtualization Technology News and Information
Article
RSS
How to prepare and strengthen defenses against cyberattacks as quantum computing looms

By Srinivas Bhattiprolu, Head of Pre-Sales and Advanced Consulting Services at Nokia

Digital certificates are cryptographic tools that form the bedrock of secure communications, ensuring the encryption of data and that only trusted devices and users can connect to the network. However, nothing is immune to technological advancements, which continue to reshape the cybersecurity landscape.

Quantum computers, for example, promise to perform complex calculations at unprecedented speeds relative to classic computing speeds, with wide-ranging implications such as accelerated drug discovery in healthcare and better risk modeling for fraud detection in finance.

McKinsey has estimated that 5,000 quantum computers will be operational by 2030, but the necessary hardware and software for handling complex problems will not be available until 2035 or later. With access to quantum computing, most asymmetric encryption algorithms will become vulnerable to cyberattacks as we know them today.

Although 2035 seems far off, cybercriminals are already preparing for this emerging technology, which is capable of breaking mathematics-based algorithms that protect our data privacy.

In fact, a new form of cyber-threat has developed- harvest now, decrypt later. This is when large amounts of encrypted data are being eavesdropped on, captured, and stored away until quantum capabilities become more readily available.

What is the current role of digital certificates in modern security?

Digital certificates operate within the framework of public key infrastructure (PKI). This infrastructure manages the issuance, distribution and validation of digital identities throughout networks. In essence, they act as digital credentials that authenticate and facilitate secure electronic communication and data exchange between people, systems, and devices online.

A certificate management tool handles all these digital certificates because it helps manage the network, prevent interruptions and downtime, and provide detailed monitoring of the whole infrastructure.

So, how does quantum computing challenge digital certificates?

Quantum computing threatens the security protocols that currently safeguard digital certificates. Classical asymmetric encryption algorithms, such as Rivest-Shamir-Adleman (RSA) and elliptic curve cryptography (ECC), rely on mathematical problems that quantum computers can solve with unprecedented speed. This poses significant risks to the confidentiality and security of sensitive information.

As a result, cybersecurity experts and researchers are actively developing quantum-resistant cryptographic algorithms to combat these risks. The National Institute of Standards and Technology (NIST) is currently engaged in a multi-year process to establish standards for quantum-resistant public-key cryptographic (PKC) algorithms.

Initially, NIST is recommending four cutting-edge algorithms and considering additional ones. The first is for encryption (CRYSTALS-KYBER), and the last three are for digital signature schemes (CRYSTALS-Dilithium, FALCON, SPHINCS+).

Preparing digital certificates for the quantum computing

There are three ways to prepare and adapt digital certificates for this upcoming threat.

The first step is understanding what cryptography is used by which applications and for what purpose. The process of creating a crypto inventory includes mapping how digital certificates and secrets are being used in the infrastructure as well as how the signature and encryption algorithms being used. 

Once you have that information cataloged, implement robust certificate and key management practices, including key rotation strategies and secure key storage solutions, to enhance your current security and prepare for the quantum era.

Next, organizations need to continuously monitor cryptographic practices to ensure they meet evolving standards and avoid hefty fines. The guidelines set by regulators and technology institutes like NIST or the National Cybersecurity Agency of France (ANSSI) will be crucial in accelerating investments toward a quantum-safe migration. Be prepared to react and remediate quickly to maintain compliance, which can be done by conducting thorough risk assessments.

Once these practices are established, the final step is to integrate quantum-resistant algorithms into certificate lifecycle management (CLM), which plays a pivotal role in ensuring the continuous operation and security of digital certificates throughout their lifecycle-from initial issuance to renewal and cancellation.

As organizations confront the impending realities of quantum computing, integrating quantum-resistant algorithms into CLM frameworks becomes paramount. This integration requires careful consideration of interoperability, compliance with industry standards and the scalability of cryptographic solutions.

By adopting smart strategies and proactive approaches, organizations can strengthen their security compliance while minimizing operational disruptions.

Overcoming challenges and embracing best practices

Transitioning to quantum-resistant cryptography presents several challenges, including the need for enhanced computational efficiency and interoperability with existing systems.

Organizations must also navigate regulatory compliance requirements and ensure seamless integration across diverse technological environments.

Best practices include conducting thorough risk assessments, fostering collaboration with cybersecurity experts, and investing in ongoing research and development initiatives.

The path forward: a quantum-safe future

Looking ahead, stakeholders across government, industry, and academia must collaborate to advance quantum-resistant cryptography and strengthen digital certificate infrastructures. Governments can play a pivotal role in funding research initiatives and establishing regulatory frameworks that promote the adoption of quantum-safe security measures.

Meanwhile, businesses should prioritize cybersecurity investments and workforce training programs to build resilience against evolving cyber threats.

In conclusion, digital certificates are indispensable tools for maintaining trust and security in online communications. However, the rise of quantum computing necessitates proactive measures to protect against future threats.

By embracing quantum-resistant cryptographic algorithms and enhancing CLM practices, organizations can confidently navigate the complexities of the quantum era.

Together, stakeholders can ensure that digital certificates continue to serve as reliable guardians of privacy and security in an interconnected digital ecosystem.

##

ABOUT THE AUTHOR

Srinivas Bhattiprolu 

As Head of Pre-Sales and Advanced Consulting Services at Nokia, Srinivas Bhattiprolu is primarily responsible for driving the Cloud and Network services portfolio business along with business consulting business for the company.

Srinivas is a result-oriented IT professional with over 22 years of techno-managerial experience. Srinivas has cultivated a strong understanding of the security domain, specializing in IoT Consulting and IoT Security, building solution blueprints and the corresponding use cases for communication service providers. He also possesses knowledge and working experience in various domains such as telecommunications, banking, financial services and industrial process control.

Published Tuesday, July 23, 2024 7:33 AM by David Marshall
Filed under: ,
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<July 2024>
SuMoTuWeThFrSa
30123456
78910111213
14151617181920
21222324252627
28293031123
45678910