Communications between people, companies and organizations increasingly take place through the internet. When meetings are not in person, data protection and authenticating the recipient’s identity must be done with cryptographic methods. This is the only way to protect the privacy of people and the confidentiality and integrity of the communications between different parties.
Currently, the cryptographic algorithms that are used are based on a few mathematical problems that are impossible to break with the current computers. However, with the quantum computers currently in development, these algorithms will be easy to break.
There are not yet enough quantum computers powerful enough to threaten the current cryptology, but the situation must not be greeted with a shrug. Even if breaking the encryptions is impossible, the encrypted traffic can be recorded. In the future, it will be possible to unpack the recorded traffic once the capability is available with quantum computers. This means that adopting quantum-safe encryption methods is one of the most important changes that cyber security needs to make in the near future.
Quantum-safe algorithms are to be standardized in the near future
Because traditional cryptological algorithms are vulnerable with quantum computers, their functionality must be replaced with new methods. These are called quantum-safe algorithms (post quantum cryptography, PQC). The PQC algorithms are based on new and different mathematical problems that the currently known algorithms run on quantum computers cannot solve.
Like the current public-key cryptography solutions, quantum-safe encryption will be based on commonly accepted standards. The international standards are based on the process of NIST (National Institute of Standards and Technology), during which one or more PQC algorithms are evaluated and standardized.
Preserving cyber security requires the systems to be re-evaluated
The transition to quantum-safe methods, for example, updating the protocols, devices and legacy programs, takes a long time, so it is good to prepare early. Preparing for the era of quantum computers begins with acknowledging the quantum threat and its impact on your own systems. It is worth monitoring the development of quantum calculations and cyber security regularly because, billions of dollars are currently being invested in the development of quantum machines, and significant development can happen very quickly. In addition, it is good to evaluate the quantum risks of your own organization and recognize the critical data assets and their existing protection.
Once the international and national standards have been defined, it is time to begin the transfer to quantum-safe solutions. It requires the evaluation of all solutions, products and systems during the transition to PQC. Key lengths may grow significantly compared to the present, and the running times of algorithms may change, for example.