The rapid advances we are seeing in emerging technologies like AI, ML and quantum computing will have a devastating impact on organizations not prepared and who have not considered updating existing modes of asymmetric data encryption.
Quantum is coming at a faster pace than anyone previously contemplated.
The unprecedented power of quantum computers might enable nation-states and threat actors to crack the digital encryption system upon which the modern information and communication infrastructure depends.
By breaking that encryption, quantum computing could jeopardize military communications, financial transactions, the support system for the global economy and even the foundations of liberty from which our society operates.
Add in the potential for AI to increase cyber threats exponentially, CISA, NSA, and NIST urge organizations to begin preparing now by creating quantum-readiness roadmaps, applying risk assessments and analysis, and engaging vendors to test solutions that involve crypto agility and quantum resilience leading to a zero-trust architecture.
Crypto agility allows organizations to apply any of the NIST Post Quantum Cryptography candidates or their own custom developed algorithms.
Quantum-resilience providers then create a hyper encrypted trusted channel resilient to the threat of decryption from quantum-based computers.
Any adversary will be unable to identify that PQC has been employed and will waste valuable time and compute power collecting data that they will never be able to decrypt.
While these cryptographic methods might be effective against classical computers, they simply do not stand a chance against the combined force of AI and quantum computing.
This will help determine which cryptographic schemes you are using, where they are located, and which ones are most vulnerable to AI and quantum attacks.
Orchestrated cryptographic agility, powered by AI, could have the potential to stay one step ahead of attackers by shifting algorithms and keys so hackers see no consistent patterns.
Given that multiple post-quantum algorithms are being proposed and developed, AI can assist in determining which of these algorithms is best suited for a particular use case, based on factors such as security, performance and available resources.
Post-quantum cryptography, for example, uses new cryptographic algorithms that are resistant to quantum computers and may also help with AI-based attacks.
AI can be used for cryptanalysis of post-quantum cryptographic algorithms.
It is important to know that new quantum safe encryption methods can be deployed now.
The challenge is to make them work with existing encryption algorithms.
Through crypto-agility, advanced quantum secure encryption solutions can map the network and identify which encryption algorithms and protocols are being employed for security between endpoints and servers.
The days of relying on outdated encryption algorithms are gone.
Don't let the fear of quantum computing hold you back from achieving digital transformation and quantum safety today.
The time is now to understand AI and quantum threats and work to ensure your data and networks are resilient against powerful unexpected adversarial threats.
This Cyber News was published on www.cybersecurity-insiders.com. Publication date: Tue, 20 Feb 2024 23:43:05 +0000