• Tue. Nov 28th, 2023

    Critical Thought

    Critical thoughts on quantum technologies

    Encryption in an Era of Quantum Computing: Securing the Digital Landscape

    ByThemba Hadebe

    Nov 21, 2023
    Encryption in an Era of Quantum Computing: Securing the Digital Landscape

    In the ever-evolving digital landscape, the race to protect sensitive information is on. The emergence of quantum computers has posed a significant threat to traditional encryption methods, calling for a paradigm shift in data security. As organizations and governments recognize the urgency to safeguard their data, new initiatives are being introduced to address the quantum threat.

    One of the key players in this pursuit is the United States federal government. The May 2022 White House National Security Memo on Quantum has set the stage for prioritizing the transition to quantum-resistant cryptography. Agencies are required to test commercial solutions that implement pre-standardized quantum-resistant algorithms, as stated in the memo. This emphasis on cryptographic agility aims to reduce the time needed for transition and accommodate future cryptographic standards seamlessly.

    To guide agencies in this transition, the Office of Management and Budget released a memorandum in 2022, known as OMB M-23-02. This document provides guidance on migrating to post-quantum cryptography and requires agencies to submit an inventory of information systems and assets vulnerable to cryptographically relevant quantum computers.

    Collaboration between the private and public sectors is crucial in this endeavor, as highlighted by the National Security Agency’s Commercial National Security Algorithm Suite 2.0. This suite recommends deploying post-quantum cryptography algorithms to protect national security systems within specific timeframes. The aim is to transition to post-quantum cryptography by 2030 to 2033.

    Standardization efforts are underway, and some criteria are already being promoted to enhance public sector protection from potential quantum security breaches. NIST Special Publication 800-208 recommends “Stateful Hash-Based Signature Schemes” for generating digital signatures. However, implementing this recommendation poses challenges. Hardware security modules are necessary, and private keys for stateful schemes cannot be copied. Redundancy can be achieved through the acceptance of keys from independent roots or by distributing hierarchical trees across hardware security modules.

    In addition to these recommendations, the government’s emphasis on symmetric key management is notable. The Commercial Solutions for Classified (CSfC) Key Management Annex highlights the importance of symmetric keys for long-term data protection. Industry efforts are focused on developing key generation solutions that comply with the CSfC requirements and ensure quantum-resistant cryptographic protection of classified information.

    As organizations navigate this new era of encryption, three fundamental factors should guide their security approach:

    1. Know Your Risks: Recognize that encryption methods become less secure over time. Addressing longer-term risks is crucial to maintaining data security.

    2. Focus on Crypto Agility: Encryption algorithms evolve and change. It is essential to adopt new algorithms while using existing ones. Crypto agility allows for future-proofing data security.

    3. Start Today: Take proactive steps to develop a comprehensive strategy for post-quantum cryptography. Early planning and implementation are key to protecting sensitive information in the quantum era.

    In conclusion, the race to quantum-proof encryption is a pressing challenge that demands proactive measures. Governments, industry leaders, and organizations must collaborate to develop and implement quantum-resistant cryptographic solutions. With a focus on risk assessment, crypto agility, and early action, the digital landscape can transition into a quantum-secure future.


    1. What is quantum-proof encryption?

    Quantum-proof encryption refers to cryptographic methods that can withstand attacks from quantum computers. Traditional encryption methods are vulnerable to quantum computers, which can break current cryptographic algorithms. Quantum-proof encryption algorithms are designed to resist attacks from quantum computers, ensuring the security of sensitive data in the future.

    2. Why is quantum computing a threat to encryption?

    Quantum computers have the potential to break traditional encryption methods by utilizing their immense computing power and the principles of quantum mechanics. These computers can solve complex mathematical problems at an unprecedented speed, rendering current encryption algorithms ineffective. As quantum computing technology advances, the need for quantum-proof encryption becomes imperative to protect sensitive data from future threats.

    3. How can organizations prepare for the quantum threat?

    Organizations can prepare for the quantum threat by adopting cryptographic agility, which involves transitioning to quantum-resistant encryption algorithms while still using existing algorithms. It is also crucial to assess the risks posed by quantum computers and develop a comprehensive strategy for post-quantum cryptography. Early action and collaboration with industry experts and government agencies are essential to ensure data security in the quantum era.

    (Note: The original article does not provide specific sources. Therefore, no sources are included in this new article.)