Once a cutting-edge sci-fi theory, quantum encryption – along with the computing power that drives it – may be close to wide-scale deployment. When it comes online, all previous cryptographic standards used to protect our data could go up in smoke.

With every tool that could change the world comes questions of scale and mass deployment. Is it ready to be rolled out for wide use? How should chief information security officers (CISOs) prepare for this major change?

Quantum encryption 101

In a nutshell, quantum computing allows us to do more in less time. Computing no longer is binary between zeros and ones; everything in between is fair game. Instead of bits, we have quantum bits, or qubits, allowing complex, multidimensional computations.

For the purposes of encryption, quantum computing would allow an attacker to cut down the time needed to crack a code. Government agencies work on quantum computing for this purpose.  Therefore, as we move out of the theoretical space, the issue CISOs should be concerned with is less “if” and more “what do I need to do and by when?”

Preparing to quantum-proof your business

How can CISOs, risk managers and all those interested protect their data in the post-quantum world?

Quantum-proofing your protection should be on your mid- to long-term radar. Your near-term longevity as a CISO will likely depend on making your environment quantum-safe. Expect big changes within the next three to five years (though some argue we are 50 years away). It’s your decision how you place your bet.

If you are in the middle of, or getting ready for a digital transformation and improving your cryptographic standards is not part of your plan, change your plan to do so. If you haven’t already, start identifying data based on the cryptographic standards in use. You’ll find out soon why that matters.

Quantum-resistant solutions today

Sometime in 2022, the National Institute of Standards and Technology (NIST) is expected to release updated standards on algorithms. One existing cryptographic standard, AES-256, may already provide post-quantum cryptography protection. There are business decisions to be made, and, with new standards coming out soon, wait for that list. More are expected to be released in 2024, so get to know names like CRYSTALS-Kyber and CRYSTALS-Dilithium as possible algorithms considered quantum-safe.

Furthermore, some research shows that 6,600 logical, error-corrected qubits are required to break AES-256 encryption. The industry is probably sitting at around the 1,000 qubit range as of this writing, but IBM’s quantum roadmap shows 4,000+ qubits by 2025 and scaling up to 100,000 by 2026. Do you really want to dump a bunch of resources for something that could be obsolete in three or four years?

Lesson? Be cool, a lot is going on these days.

It’s still 2022, so it’s not like your run-of-the-mill dark web actor has spun up a series of quantum computers and is in an attack frenzy. If anybody is using quantum computing as part of an attack, there is likely nation-state backing. Therefore, you have some time to research, review new results and plan wisely to minimize your business risk and improve your organizational resilience.

But don’t be fooled: this is happening. Governments have post-quantum cryptography on the radar. In January, the White House issued a memorandum directing federal agencies to begin quantum-safe modernization planning.

What does preparation look like?

Until you figure out what your quantum-proofing transformation plan looks like, there are two tasks you can get right to:

  1. Understanding and tagging your data.
  2. Cataloging your cryptography currently in use.

As a matter of good cyber hygiene, you must know and tag your data. Poorly managed systems of record are a weak link in any plan, quantum or no quantum. There is nothing flashy about keeping a configuration management database up-to-date or classifying your data correctly. If you are serious about improving your cybersecurity posture, though, clean up your data sources.

As part of that cleanup, create a catalog of your cryptography standards deployed. Look at both data in transit and at rest. You may hear this cataloging referred to as a ‘crypto inventory’ in some circles. Knowing what standards you have in place will help you learn which of your data sources are at most risk against quantum attacks. Lower standards lead to higher risk.

First steps on a longer road

Tagging data and cataloging your cryptography will not end your quantum-safe journey, but they will start it off right. You also get the added bonus of improving your existing cybersecurity posture. It’s a win-win. Put these tasks first, provide the right resources behind them and you’re already on the road to reducing your risk.

More from Risk Management

How TikTok is reframing cybersecurity efforts

4 min read - You might think of TikTok as the place to go to find out new recipes and laugh at silly videos. And as a cybersecurity professional, TikTok’s potential data security issues are also likely to come to mind. However, in recent years, TikTok has worked to promote cybersecurity through its channels and programs. To highlight its efforts, TikTok celebrated Cybersecurity Month by promoting its cybersecurity focus and sharing cybersecurity TikTok creators.Global Bug Bounty program with HackerOneDuring Cybersecurity Month, the social media…

Roundup: The top ransomware stories of 2024

2 min read - The year 2024 saw a marked increase in the competence, aggression and unpredictability of ransomware attackers. Nearly all the key numbers are up — more ransomware gangs, bigger targets and higher payouts. Malicious ransomware groups also focus on critical infrastructure and supply chains, raising the stakes for victims and increasing the motivation to cooperate.Here are the biggest ransomware stories of 2024.Ransomware payments reach record highRansomware payments surged to record highs in 2024. In the first half of the year, victims…

83% of organizations reported insider attacks in 2024

4 min read - According to Cybersecurity Insiders' recent 2024 Insider Threat Report, 83% of organizations reported at least one insider attack in the last year. Even more surprising than this statistic is that organizations that experienced 11-20 insider attacks saw an increase of five times the amount of attacks they did in 2023 — moving from just 4% to 21% in the last 12 months.With insider threats on the rise, it’s critical for businesses to recognize the real dangers that originate from inside…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today