siliconindia | | SEPTEMBER 20258As quantum computing edges closer to reality, the foundation of modern encryption RSA, ECC, and DH is under threat. These algorithms rely on mathematical problems that quantum computers could solve in seconds, rendering current security protocols obsolete. This looming risk has ignited a global movement toward Post-Quantum Cryptography (PQC), a new cryptographic paradigm designed to withstand quantum attacks.Sunil Gupta, Co-founder & CEO, QNu Labs says, "Quantum computers are no longer a distant threat but an imminent reality and once they mature, they will break today's classical encryption in seconds, leaving no data, whether at rest or in motion, safe.The Silent Quantum RiskQuantum computers, leveraging qubits (quantum bit), threaten to break the math that underpins today's encryption. Experts warn that a `Q-Day' (Quantum day) when a quantum machine can defeat RSA/ECC could arrive within the next decade. This would nullify the security of email, VPNs, and e-Commerce, prompting a `harvest now, decrypt later' risk (attackers might collect encrypted data today to crack with future quantum power.To stay ahead, the security world is reinventing encryption, replacing vulnerable algorithms with quantum-resistant ones, a field called post-quantum cryptography (PQC). Governments and agencies (NIST, NSA, CISA...) now emphasize `quantum readine' for example, jointly urging organizations to start migrating to PQC immediately. As one IBM executive put it, building a `quantum-safe future' is critical even as quantum computers advance.The Next Chapter of CryptographySince 2016 NIST has led a global effort to standardize quantum-resistant algorithms. In August 2024 NIST finalized its first PQC standards. These define entirely new encryption tools:· ML-KEM (CRYSTALS-Kyber): a lattice-based key-encapsulation mechanism for secure key exchange· ML-DSA (CRYSTALS-Dilithium): a lattice-based digital signature scheme· SLH-DSA (SPHINCS+): a stateless hash-based signature algorithm serving as a backup standardA fourth algorithm, FN-DSA (FALCON), will be added soon. Together these new FIPS standards (203205) are `built for the future' and ready for immediate use. NIST explicitly urges organizations to begin integrating them now `full integration will take time', notes the standards project lead.In short, PQC replaces RSA/ECC with wholly new primitives, laying a fresh cryptographic foundation for a post-quantum world.Real-World Success StoriesCase Study 1: AWS's Hybrid Post-Quantum Key ExchangeOverview: Amazon Web Services (AWS) has been leading in the implementation of PQC in its cloud services. In response to the possible risks of quantum computing, AWS began to roll out hybrid post-quantum key exchange standards in Transport Layer Security (TLS) in a number of its services.Implementation: AWS Key Management Service (KMS), AWS Certificate Manager (ACM), and AWS Secrets Manager endpoints currently support Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) to use hybrid post-quantum key agreement. This interface secures any information sent via such services to withstand any next-generation quantum attack.Outcome: PQC standards implementation in AWS services reflects the long-term dedication of this company to the safety of data. It offers greater protection to the customers, ensuring that their data remains secure even in the face of advancing quantum technologies.EDITORIAL EXCLUSIVEPOST QUANTUM ENCRYPTION EMERGES AS THE SHIELD FOR TOMORROW'S DATAUNVEILING THE DUAL REALITIES OF DARK WEBSITES IN THE DIGITAL AGE· Quantum computers can break current encryption (RSA, ECC, DH), risking all digital data.· Post-Quantum Cryptography introduces quantum-resistant algorithms like Kyber and Dilithium.· PQC is complex and resource-heavy, but early implementation is critical for future security.By M R Yuvatha, Senior Correspondent, siliconindia
<
Page 7 |
Page 9 >