Endpoint

5/23/2018
11:45 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

What Should Post-Quantum Cryptography Look Like?

Researchers are tackling the difficult problem of transitioning toward a new mode of cryptographic protections that won't break under the pressure of quantum computing power.

As quantum computing starts barreling away from the theoretical world and into the  realm of reality, the security community is on a timer. Most experts say that once quantum computers come online, they'll have the computational powers to easily break modern cryptography. A new report out today from the Cloud Security Alliance's Quantum Safe Security Working Group says that security researchers, vendors and enterprises need to start working now if they want to beat quantum's cryptographic buzzer.

Considering how long it takes for the IT world to transition to new encryption measures when old ones wear thin, the CSA report warns that the window until quantum reaches widespread adoption - about 10 to 15 years - might not be as long as it seems right now. 

"Cryptographic transitions take time, often a very long time," the report explains, pointing to the decade-long transition it took to get from 1024- to 2048-bit RSA key sizes, or the move to elliptic curve-based cryptography (ECC). "The transition to quantum-resistant cryptography is likely to take at least ten years. It is therefore important to plan for transition as soon as possible," according to the report.

The good news is that researchers have been working on this problem for a long time and they've got some good ideas on where cryptography should be headed. For example, NIST just last month held a workshop that featured some 80 research submissions in its Post Quantum Crypography Standardization initiative. The CSA report offers a breakdown of five of the most promising categories of cryptographic methods that could stand as post-quantum cryptography alternatives.

The five major contending algorithmic classes are:

  • Lattice-based cryptography,
  • Hash-based schemes,
  • Elliptic curve isogenies,
  • Multivariate cryptography, and
  • Code-based cryptography.

According to Roberta Faux, lead author of the CSA report, there are pros and cons for each class of algorithm and it's going to take some time for researchers, and later, security engineers, to figure out which is best for a workable standard. 

For example, she says the community is going to have to have a lively debate to balance out three big trade-offs, namely key size, bandwidth and confidence level. 

If you consider code-based schemes, they've got a fast computational speed and they've been around so long that they've got a high degree of confidence from many in the security community. But their key size is large - some might say impractically so, Faux says. Meanwhile, isogeny-based cryptography has got small key sizes but the computation is still expensive and it's relatively new so there's less confidence there.

"I think the community agrees that we still need more time  to investigate the wide range of post-quantum cryptographic algorithms," Faux says, "and [to] understand the issues involved in migrating from existing public key cryptography to post-quantum cryptography."

Related Content:

 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
holochain-wins
50%
50%
holochain-wins,
User Rank: Apprentice
5/24/2018 | 10:11:36 PM
answer to post quantum cryptography
It seems many are mistaken about some things so I will elaborate some: going dark is already here. Almost like America's Berlin wall is falling, without highly secure encryption our countries military would be vulnerable overnight. Without CONTINUED research and development within the United States to stay ahead, making larger conventional munitions would be useless. 

What would post-quantum look like?

ANSWER: Since the marketing hype of late promotes how encryption will be cracked in days in the future, is NOT taking into account places like FreeEmailEncryption's algorithms have already made cracking obsolete currently in the field. They use a charding technique, morphing dynamic algo, million bit variable offline key generation for using with supercomputers, and there defeat of brute force cracking with key/message expiration, man in the middle protection, padding, alerting. They even have a way to setup attackers with a honey pot. So replay attacks are stopped and cracking can not happen. That is post quantum. It is here today. Since there method relies heavily on cracking with trillions of computations to solve the password, quantum level brute forcing is 19th century cryptanalysis! The future will have users generating trillion bit keys on morphic algorithms using inhome supercomputers or distributed applications on holochains the new internet.
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Now about that mortgage refinance offer from Wells Fargo .....
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6970
PUBLISHED: 2018-08-13
VMware Horizon 6 (6.x.x before 6.2.7), Horizon 7 (7.x.x before 7.5.1), and Horizon Client (4.x.x and prior before 4.8.1) contain an out-of-bounds read vulnerability in the Message Framework library. Successfully exploiting this issue may allow a less-privileged user to leak information from a privil...
CVE-2018-14781
PUBLISHED: 2018-08-13
Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolu...
CVE-2018-15123
PUBLISHED: 2018-08-13
Insecure configuration storage in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows remote attacker perform new attack vectors and take under control device and smart home.
CVE-2018-15124
PUBLISHED: 2018-08-13
Weak hashing algorithm in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows unauthenticated attacker extract clear text passwords and get root access on the device.
CVE-2018-15125
PUBLISHED: 2018-08-13
Sensitive Information Disclosure in Zipato Zipabox Smart Home Controller allows remote attacker get sensitive information that expands attack surface.