QKD: The Key to a Resilient Future
One of the most imminent and pressing threats to organizations presently is harvest now, decrypt later (HNDL) attacks. According to a recent poll, half of responding professionals at organizations considering quantum computing benefits believe that their organizations are at risk for HNDL attacks. During an HNDL attack, threat actors will “harvest” encrypted data from unsuspecting organizations. The goal is to decrypt this data later when quantum computing reaches maturity to deem certain existing cryptographic algorithms obsolete. As these emerging threats persist, it has become crucial for organizations to be aware that they all stand to face HNDL threats at some point, which is why they must leverage quantum key distribution (QKD) as part of their security strategy. Post-quantum cryptography standards have been developed by NIST in a six-year program that is two years away from releasing its first standard encryption algorithm. Do we really have two more years to allow HNDL attacks to continue unchecked?
Harvest and Decrypt: The Most Immediate Threats
Cybercriminals are exploiting harvesting attacks by strategically storing encrypted data until quantum computer technology catches up with the decryption process. This is a prominent threat presently, as an incredible amount of sensitive data is being stored and most of our adversaries can store encrypted data and simply wait to decrypt the data in the future.
For example, countries including China, Iran or Russia may be harvesting data as we speak. The United States has already taken preliminary steps to slow China’s advances in the high-tech sector that pose an immediate threat to our national security. For instance, just this past October, the Biden administration established regulations to block Chinese firms trying to develop advanced chips from accessing non-Chinese factories that rely on U.S. technology to manufacture their products.
Certain industry sectors are at an increased risk for attacks. For example, there is an increased likelihood that the health care profession may fall victim to cybersecurity attacks due to the industry having sensitive information with a long shelf life and substandard cybersecurity tools to protect this data. This has begged the question of what next steps are needed to mitigate any future security threats that could be detrimental to our nation and its commercial industry.
Deploy QKD as a Mitigation Tactic
When it comes to the threat posed by powerful quantum computers, it’s not a question of what quantum computers can do today but rather what will happen when a quantum computer is powerful enough to break RSA encryption. To get ahead of this issue, there is one distinct application that should be deployed today, specifically in the realm of security, and that is QKD. In leveraging randomly generated quantum keys to transmit data that has been encrypted and transported through a fiber optic cable, only the intended recipient of the data can access and decrypt information.
Post-quantum cryptography (PQC) standards are mathematically safe. Still, QKD is protected by the laws of quantum physics, so it is much safer and not exposed to mathematical algorithms that can reduce security, as in PQC. Also, QKD functions efficiently because it can run on existing computer and telecommunications infrastructure.
Additionally, QKD offers a more simplified approach to data transmission overall. When used in tandem with the NIST post-quantum encryption standards, QKD can be the most resilient defense tactic against imminent attacks. So, what steps should companies be taking to ensure they’re adequately armed?
A preliminary step in the right direction is to create a QKD proof-of-concept trial. It’s key to start on a smaller scale to ensure that if there are additional areas to troubleshoot when deploying, they won’t compromise broader collections of sensitive data. When it comes to implementation, time is of the essence. From there, businesses should increase their network size gradually, so as not to overwhelm all critical data paths. Once network tests have been performed and things are running smoothly, QKD can be deployed to help keep sensitive data safe against HNDL attacks. So long as security teams are deploying QKD security across all critical data paths, it can eventually be implemented across a metro-scale network.
Implementing Solutions for the Long Haul
Presently, organizations may only be aware of harvesting attacks on data that is encrypted with public key RSA cryptography; however, over the next thirty years, we must anticipate harvesting attacks on sensitive data encrypted with post-quantum cryptography (PQC). All algorithm-based encryption has a shelf life.
In the meantime, organizations should take advantage of front-running technologies such as QKD. Those who adopt this platform early will be put in a strong position to be resilient going forward, as they remain at the forefront of innovations. Ensuring complete security against future harvesting attacks solely depends on the steps organizations take today to leverage QKD.