Defending Encryption: Quantum XChange at Cisco Live Amsterdam
Back to Blogs & Podcasts
08 Mar 2024
On Jan. 26, 2024, Quantum Xchange joined the White House Office of Management and Budget (OMB), the White House Office of Science and Technology Policy (OSTP), and other members of the intergovernmental PQC Migration Working Group to discuss, debate and prepare formal guidance for government agencies as they begin their efforts to replace legacy encryption with post-quantum cryptography (PQC).
In a three-part blog series, we share Quantum Xchange’s responses to the pre-event questionnaire all PQC Roundtable distinguished guests were asked to complete.
Q: How will networks need to be re-architected to prepare for PQC migration?Preparing networks for PQC migration involves a strategic approach with both current initiatives and plans for the next 3-5 years, along with an ongoing strategy:
Current/Immediate Initiatives
In the Next 3-5 Years
Ongoing Strategy
Additionally, a significant impact is expected from the integration of the NIST-standardized PQC algorithms into new protocols like TLS 1.4 or TLS 2.0. Adopting these standards will facilitate a smooth and seamless transition to PQC for web services and browsers.
This adoption will cover most online traffic immediately, without the need for specialized hardware or extensive architectural changes. This approach is seen as the most efficient and cost-effective way to broadly implement PQC, providing widespread protection against quantum threats with minimal disruption to current network structures.
Q: Which mission capabilities or functions should agencies prioritize for testing of PQC algorithms?The focus for testing PQC algorithms should be on implementing and evaluating crypto diversification and redundancy, as these are key to building resiliency in cryptographic systems. The rationale for this approach is multifaceted:
Overall, the focus should be on creating a versatile and robust cryptographic infrastructure that can adapt to changing threats and technologies. By prioritizing these areas for testing PQC algorithms, agencies can ensure that their cryptographic systems are not only secure against current threats but are also prepared for future challenges in the realm of cryptography.
Q: In what cases will agencies need to acquire new hardware as part of their PQC migration?The need for new hardware in the context of PQC migration varies based on the type of hardware and its current capabilities:
Despite this limitation, endpoints will still be able to use software-based PQC algorithms as TPMs are not mandatory for this function.
Some of this older infrastructure may not be capable of running the updated operating systems that include PQC implementations, necessitating hardware upgrades.
For example, it’s impractical to front-end each device in a network of IoT security cameras with a PQC proxy. However, in many scenarios where IoT is deployed, the facility or network requirements might not consider cryptographic algorithms as the weakest link, possibly reducing the urgency for updates.
While desktop workstations, servers, and most network infrastructure can become quantum-safe through software updates, older network hardware and certain IoT technologies may require new hardware for PQC migration. The decision to acquire new hardware will depend on the specific capabilities and limitations of the existing infrastructure, as well as the security requirements and the potential vulnerability of the hardware to quantum threats.
Q: Where may agencies see performance impacts as a result of their PQC migration?Agencies are unlikely to experience significant performance impacts from PQC migration in most areas, with the potential exception of legacy IoT devices. We don’t believe the use of larger key sizes (such as 1Mb keys) and more frequent key exchanges associated with PQC will significantly burden modern processors and networks.
The rationale behind this assertion is that the processing power available even in average smartwatches today, along with the bandwidth exceeding gigabits in most homes, are more than sufficient to handle the demands of PQC.
In the case of legacy IoT devices, if they are capable of being upgraded to support PQC, there might be some performance impacts due to their typically limited processing power and storage capacity. However, in general, the current state of technology in terms of processing capabilities and network bandwidth is seen as well-equipped to handle the requirements of PQC without major performance degradation.
This perspective suggests that concerns about performance impacts due to PQC migration may be overstated, especially considering the rapid advancements in technology and the increasing availability of high processing power and bandwidth. The primary area of focus regarding performance issues should be on older, less capable IoT devices, where upgrades to support PQC might be more challenging.
Don’t miss Part 1 and Part 3 of this three-part series.
Explore Solutions with CipherInsights
[site_pqc_posts]
Have one of our experts show you how Phio TX protects your organization from threats today and the quantum future.
Request Request
a a
demo demo