Quantum Cryptography for Risk Managers or Shor, Grover, and the Crypto-Apocalypse
According to some, quantum cryptography will revolutionize cryptography, kill our current ciphers,...
5 min read
David Gamey
:
Sep 16, 2021 10:30:00 AM
Cryptographic change is a reality. Since 2006, we have seen the sunset of WEP, SSLv2, RSA-1024, SSLv3 and early TLS. We know that Triple DES and other 64-bit blocked ciphers are on the way out. RSA will likely follow, and our current pre-quantum public key cryptosystems will eventually become deprecated. These changes have impact and require widespread coordination. Old software and hardware will need to be upgraded or replaced. It will require time, effort, money, and pro-active management. Simply reacting will be risky, painful, and expensive. Industry needs to learn from past changes so that organizations can be ready. Most importantly, we need to do better than we have done in the past. But how?
Crypto-agility is simply the ability to switch cryptographic technologies quickly and effectively. It requires knowing where you use specific algorithms, protocols, what depends on them, where your keys and cryptograms are stored. The rationale for being crypto-agile should be a no-brainer even if quantum cryptanalysis never becomes practical.
Before we can improve, we need to know how we’ve performed. Looking back:
Looking back there are some important lessons:
Looking ahead:
Cryptographic-agility will be driven by advances in cryptanalysis, improvements in software and hardware, and whatever happens with quantum computing. (We will discuss quantum cryptography in a future article).
Crypto-agility should be part of your risk management program. Fortunately, industry and standards bodies are looking into what crypto should look like in the future. They are driving the availability of standardized algorithms and protocols. Timing change is also challenging as the risk must be measured, not from the point in time of the break of a system, but from the availability of historical cryptograms after the break. Organizations only need to focus on how they use cryptography. General purpose standards and auditing processes measure what’s in-place. Crypto-agility is a measure of capability and is more forward looking. Fitting this into frameworks like PCI DSS, SOX, or a SoC audit needs a way of measuring how the capability is in-place. Cryptographic-Agility programs would need to have processes to collect and maintain inventories with details about encryption technologies and assets. Assessing completeness and accuracy could be challenging. However, we have seen how cryptographic changes can be improved with the right tools and incentives.
NIST sunsets TDEA (3DES) and with it 64-bit blocked ciphers:
David Gamey :
Sep 23, 2021 10:07:00 PM
According to some, quantum cryptography will revolutionize cryptography, kill our current ciphers,...
David Gamey :
May 20, 2021 12:00:00 AM
Organizations subject to PCI DSS compliance validation spend significant amounts of time, effort,...
Ben Rediboim :
Jul 2, 2024 12:00:00 AM
In today's fast-paced tech landscape, startups are the driving force behind innovation. However,...