Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/13/2018
02:44 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Cisco, ISARA to Test Hybrid Classic, Quantum-Safe Digital Certificates

Goal is to make it easier for organizations to handle the migration to quantum computing when it becomes available.

Cisco Systems and security firm ISARA are collaborating in an initiative to test digital certificates capable of working on conventional public key cryptography, as well as quantum computing environments.

The goal is to demonstrate how a single digital certificate supporting multiple public key algorithms can help reduce costs and the risks associated with migrating the public key infrastructure to quantum mode.

The need for such measures stems ironically enough from the power of quantum computing, which while having the potential to enable a new generation of applications also has the ability to overcome current encryption schemes.

"Quantum computing allows us to efficiently solve the hard math problems underlying the public key cryptography we rely upon today for Internet banking, connecting to work remotely, and doing ecommerce," says Mike Brown, CTO of ISARA. That fact necessitates new approaches to public key cryptography, he says.

Quantum computers are designed to harness the behavior of atoms and subatomic particles to handle computationally intensive applications — in areas like medicine — that are well beyond the capabilities of current generation computers.

Traditional crypto certificates that are used to authenticate digital transactions and IDs are not secure enough to authenticate transactions in a quantum environment. So at least for the duration of the migration from traditional computers to quantum computing, digital certificates will need to be equipped to support both computing environments.

"As a technology industry, we have been extremely successful at making the use of cryptography nearly ubiquitous," Brown says. So successful in fact that cryptography has become integral to the plumbing of the Internet, he says.

"So that means migrating cryptography, and specifically authentication tools, will involve changes to nearly everything. For a company, this will be a multi-year IT project with all of the associated complexity."

The approach in which Cisco and ISARA are collaborating is to use dual-algorithm certificates, where one algorithm works to protect quantum transactions while the other maintains backwards compatibility with traditional environments.

To demonstrate the viability of the approach Cisco and ISARA have set up a public server that uses the so-called PQ hybrid X.509 certificates (PQ for Post-Quantum) to authenticate to transport layer security clients.

"We use authentication to ensure that it was 'you' making that bill payment through your bank account online and that the amounts haven’t been tampered with," Brown says. "Quantum-safe authentication is a way to accomplish that using mathematics that quantum computers can’t solve."

Under the collaborative effort, ISARA is bringing its expertise in quantum-safe cryptography and PKI to work with Cisco and its Enrollment over Secure Transport (EST) system for issuing backwards-compatible hybrid systems.

"The collaboration between Cisco and ISARA began with a focus on the use of a particular quantum-safe authentication scheme called LMS or Leighton-Micali Signatures," Brown says. "The next phase will introduce support for additional algorithms."

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here. Register with Promo Code DR200 and save $200.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25414
PUBLISHED: 2021-06-17
A local file inclusion vulnerability was discovered in the captcha function in Monstra 3.0.4 which allows remote attackers to execute arbitrary PHP code.
CVE-2021-32078
PUBLISHED: 2021-06-17
An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4.
CVE-2021-31818
PUBLISHED: 2021-06-17
Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables.
CVE-2021-34825
PUBLISHED: 2021-06-17
Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system.
CVE-2021-32944
PUBLISHED: 2021-06-17
A use-after-free issue exists in the DGN file-reading procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a memory corruption or arbitrary code execution, allowing attackers to cause a denial-of-service c...