Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/23/2018
11:45 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

What Should Post-Quantum Cryptography Look Like?

Researchers are tackling the difficult problem of transitioning toward a new mode of cryptographic protections that won't break under the pressure of quantum computing power.

As quantum computing starts barreling away from the theoretical world and into the  realm of reality, the security community is on a timer. Most experts say that once quantum computers come online, they'll have the computational powers to easily break modern cryptography. A new report out today from the Cloud Security Alliance's Quantum Safe Security Working Group says that security researchers, vendors and enterprises need to start working now if they want to beat quantum's cryptographic buzzer.

Considering how long it takes for the IT world to transition to new encryption measures when old ones wear thin, the CSA report warns that the window until quantum reaches widespread adoption - about 10 to 15 years - might not be as long as it seems right now. 

"Cryptographic transitions take time, often a very long time," the report explains, pointing to the decade-long transition it took to get from 1024- to 2048-bit RSA key sizes, or the move to elliptic curve-based cryptography (ECC). "The transition to quantum-resistant cryptography is likely to take at least ten years. It is therefore important to plan for transition as soon as possible," according to the report.

The good news is that researchers have been working on this problem for a long time and they've got some good ideas on where cryptography should be headed. For example, NIST just last month held a workshop that featured some 80 research submissions in its Post Quantum Crypography Standardization initiative. The CSA report offers a breakdown of five of the most promising categories of cryptographic methods that could stand as post-quantum cryptography alternatives.

The five major contending algorithmic classes are:

  • Lattice-based cryptography,
  • Hash-based schemes,
  • Elliptic curve isogenies,
  • Multivariate cryptography, and
  • Code-based cryptography.

According to Roberta Faux, lead author of the CSA report, there are pros and cons for each class of algorithm and it's going to take some time for researchers, and later, security engineers, to figure out which is best for a workable standard. 

For example, she says the community is going to have to have a lively debate to balance out three big trade-offs, namely key size, bandwidth and confidence level. 

If you consider code-based schemes, they've got a fast computational speed and they've been around so long that they've got a high degree of confidence from many in the security community. But their key size is large - some might say impractically so, Faux says. Meanwhile, isogeny-based cryptography has got small key sizes but the computation is still expensive and it's relatively new so there's less confidence there.

"I think the community agrees that we still need more time  to investigate the wide range of post-quantum cryptographic algorithms," Faux says, "and [to] understand the issues involved in migrating from existing public key cryptography to post-quantum cryptography."

Related Content:

 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
holochain-wins
50%
50%
holochain-wins,
User Rank: Apprentice
5/24/2018 | 10:11:36 PM
answer to post quantum cryptography
It seems many are mistaken about some things so I will elaborate some: going dark is already here. Almost like America's Berlin wall is falling, without highly secure encryption our countries military would be vulnerable overnight. Without CONTINUED research and development within the United States to stay ahead, making larger conventional munitions would be useless. 

What would post-quantum look like?

ANSWER: Since the marketing hype of late promotes how encryption will be cracked in days in the future, is NOT taking into account places like FreeEmailEncryption's algorithms have already made cracking obsolete currently in the field. They use a charding technique, morphing dynamic algo, million bit variable offline key generation for using with supercomputers, and there defeat of brute force cracking with key/message expiration, man in the middle protection, padding, alerting. They even have a way to setup attackers with a honey pot. So replay attacks are stopped and cracking can not happen. That is post quantum. It is here today. Since there method relies heavily on cracking with trillions of computations to solve the password, quantum level brute forcing is 19th century cryptanalysis! The future will have users generating trillion bit keys on morphic algorithms using inhome supercomputers or distributed applications on holochains the new internet.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.
CVE-2020-10989
PUBLISHED: 2020-07-13
An XSS issue in the /goform/WifiBasicSet endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute malicious payloads via the WifiName POST parameter.
CVE-2020-10986
PUBLISHED: 2020-07-13
A CSRF issue in the /goform/SysToolReboot endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to reboot the device and cause denial of service via a payload hosted by an attacker-controlled web page.
CVE-2019-19338
PUBLISHED: 2020-07-13
A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is ...