29 Oct 2021

Preparing for the quantum migration

Andersen Cheng, CEO, Post-Quantum discusses the capabilities of quantum computers and what this means for data security as part of techUK's Quantum commercialisation week #QuantumUK

Imagine a nations' entire energy infrastructure going offline, bank accounts emptied, and military systems turned against the very people they are protecting. This apocalyptic scenario may seem like it only exists in the realm of Netflix Original movies; however, it may be closer to reality than we'd like to admit. 

Quantum computers capable of cracking today’s encryption standards, which protect industries from finance to defence, are commercially available, with functional machines with code-breaking capability likely to be operational within the next five years. This once in a generation event will render the entire world’s data vulnerable to theft and exploitation.  

Compared with today’s machines, quantum computers are capable of perfoming vast amounts of computations in parallel rather than solving one problem at a time. As such, quantum computers can derive knowledge from very limited datasets, which will allow them to break encryption. Those working in sensitive industries such as drug discovery or as the custodian of financial assets are at risk of a ‘harvest-decrypt’ attack — where a rouge nation-state or individual can steal data today to decrypt it with a quantum computer once they have been deployed. Now is the time to prepare governments and businesses for the quantum threat. 

Mitigating the quantum threat 

More than four years ago, the National Institute of Technology (NIST) launched a global competition to develop new algorithms that will withstand the quantum threat. Since then, immense progress has been made — it is expected that a new encryption standard will be ready in early 2022 that will eventually replace today’s standards. 

Post-Quantum’s proposal is one of four finalists in the encryption and key exchange category and the only finalist in the code-based sub-category.  While it might be likely this algorithm protects the world’s data in the years to come, there are practical steps that can be taken now to prepare for the quantum threat. 

Leverage a quantum-safe VPN   

To protect data flowing between businesses and their staff — who are likely to remain working from home for the foreseeable future — a hybrid, quantum-safe VPN is a good option. Recently, the Internet Engineering Taskforce (IETF) developed a set of specifications for such VPN products, with our team playing a central role in the original creation and development of those specifications. 

Crypto-agile and supporting the hybrid key establishment that enables post-quantum algorithms to work alongside today’s standards, the IEFT specifications ensure users are protected from traditional threats. It also provides for the negotiation of one, or more than one post-quantum key establishment schemes for those organisations seeking a double layer of post-quantum cryptography. While these solutions are beginning to emerge, be aware that choosing a backward-compatible product will be the best option for limiting disruption.  

Practice crypto-agility  

Recommended by the NSA and NIST,  crypto-agility enables organisations to leverage alternative cryptographic algorithms without the need for infrastructure change. Crypto-agility means classic cryptosystems we use today, such as RSA, can run alongside one or more post-quantum algorithms. We do expect some organisations will apply more than one post-quantum algorithm concurrently to enhance security.  

Prioritise your Y2Q crypto-migration project now 

An event like year to quantum (Y2Q) —when quantum computers reach the point of cracking encryption — only happens once every few decades. It will need a dedicated team, resources and a comprehensive project plan. The first step should be taking an inventory of where cryptography is deployed today across the organisation to set out a path that prioritises high-value assets whilst identifying any expected impact on operational systems.  A communication plan is also needed so developers and application managers can take ownership of the cryptography operating in their domain. 

Organisations, whether businesses or governments, that have become quantum-safe will avoid last-minute firefighting and secure the likely post-quantum talent vacuum we’re likely to see. Don’t become a Netflix disaster movie victim.  

 

Author:

Andersen Cheng is the CEO of Post-Quantum, a start-up working to develop and commercialise quantum-safe encryption and identity solutions. Previous roles include Head of Credit Risk at JP Morgan, Head of Corporate Development at LabMorgan (JP Morgan’s FinTech investment unit) and also COO of the Carlyle Group’s European Venture Fund. More recently, Andersen ran TRL, which was the only provider of top secret grade hardware crypto solutions to the British government – TRL was subsequently sold to L-3, the US Defence Group. 

 

Quantum Commercialisation Week

Click here to read more insights published during techUK's Quantum Commercialisation Week

Click Here

 

Laura Foster

Laura Foster

Programme Manager, Technology and Innovation, techUK

Laura is techUK’s Programme Manager for Technology and Innovation.

She supports the application and expansion of emerging technologies across business, including Geospatial Data, Quantum Computing, AR/VR/XR and Edge technologies.

Before joining techUK, Laura worked internationally in London, Singapore and across the United States as a conference researcher and producer covering enterprise adoption of emerging technologies. This included being part of the strategic team at London Tech Week.

Laura has a degree in History (BA Hons) from Durham University, focussing on regional social history. Outside of work she loves reading, travelling and supporting rugby team St. Helens, where she is from.

Email:
[email protected]
LinkedIn:
www.linkedin.com/in/lauraalicefoster

Read lessmore

Zoe Brockbank

Programme Coordinator, Policy, Tech and Innovation, techUK

Zoe is a Programme Assistant, supporting techUK's work across Policy, Technology and Innovation.

The team makes the tech case to government and policymakers in Westminster, Whitehall, Brussels and across the UK on the most pressing issues affecting this sector and supports the Technology and Innovation team in the application and expansion of emerging technologies across business, including Geospatial Data, Quantum Computing, AR/VR/XR and Edge technologies.

Before joining techUK, Zoe worked as a Business Development and Membership Coordinator at London First and prior to that Zoe worked in Partnerships at a number of Forex and CFD brokerage firms including Think Markets, ETX Capital and Central Markets.

Zoe has a degree (BA Hons) from the University of Westminster and in her spare time, Zoe enjoys travelling, painting, keeping fit and socialising with friends.

Email:
[email protected]
Phone:
020 7331 2174
Website:
www.techuk.org

Read lessmore

 

Related topics