agile quantum-safe security: start protecting today€¦ · agile quantum-safe security: start...
TRANSCRIPT
Agile Quantum-Safe Security: Start Protecting Today
Scott Totzke, CEO & Co-founder
October 16th, 2018
1st Flight of Wright Flyer I December 17, 1903
QUANTUM vs CLASSICAL
Horsepower December 17, 1903
QUANTUM vs CLASSICAL
THE QUANTUMRACE IS ON
Quantum computing will solve today’s unsolvable problems, opening up
A NEW REALM OF POSSIBILITIES.
QUANTUM’S NEGATIVE DISRUPTION
Quantum computing will break today’s public key encryption standards.
“The impact of quantum on our national defense will be tremendous.
The question is whether the United States and its allies will be ready.”
- Rep. Will Hurd, WIRED, December 2017
“All the things we do, using HTTPS for secure engagement, trading, commerce, entertainment, securing our own identity, have to be rolled out with a replacement
within the decade.
That’s why every single part of government is engaged in this because we know it takes a fair amount of timeto replace public key cryptography, maybe
a decade.”
- Professor Sir Peter Knight, The StackJune 2018
“RSA and public key crypto will be dead within a decade because of the advances in quantum computing. All the things we do, using HTTPS for
secure engagement, trading, commerce, entertainment, securing our own identity, have to be
rolled out with a replacement within the decade. That’s why every single part of government is
engaged in this because we know it takes a fair amount of time to replace public key cryptography,
maybe a decade.”
“...one key algorithm will be able to break public-key cryptography, which secure transactions over the internet. While employing this algorithm is far
beyond the current level of technology, the need to protect sensitive data and provide a reliable
infrastructure over the long-term requires moving to ‘post-quantum’
or ‘quantum-resistant’ forms of cryptography.”
- National Strategic Overview for Quantum Information Science, National Science & Technology Council
September 2018
A DAY IN LIFE WITHOUT CRYPTOGRAPHY
HOME VEHICLES TRANSPORTATION ENTERPRISECOMPUTING
MITIGATING AN UNPRECEDENTED THREAT
Today, data breaches occur outside of cryptography, and the costs of those breaches is growing.
A complete break of public key cryptography is unprecedented.
In our connected world, everything that protects data, authorizes or authenticates must be updated to be quantum-safe.
This magnitude of change has never been required on such a large scale.
PRIORITIZING THE FIXFOR TOMORROW’S THREAT
Today 2026(Mosca, IQC, 2015)*
Y2Q RangeModern cryptography
broken.
2030(NIST, 2016)*
203520152005
Average life of Critical Infrastructure (i.e. towers, lines, meters, etc.) = 10 – 40 years*
Life of an Average Vehicle = 11.5 years
2023
Development & Production 6 – 8 years
*Mosca, Michele., Institute for Quantum Computing. 2015. “Cybersecurity in an era with quantum computers: will we be ready?”.https://eprint.iacr.org/2015/1075.pdf
*NIST. April 2016. “Report on Post-Quantum Cryptography”. http://dx.doi.org/10.6028/NIST.IR.8105*https://www.popsci.com/environment/article/2009-06/next-grid
THE “NEW” MATH
Hash-based
Isogeny-based
Multivariate-based
Code-based
Lattice-based
SUCCESS IS A
SEAMLESS(and cost effective)
MIGRATIONNo Impact to End User Experience
Maintain Interoperability
THE CHALLENGEWith increased connectivity, the scale of what
needs to be updated also increases.
Migrate Critical Systems Faster
Reduce Switching Costs
THE SOLUTION: CRYPTO-AGILITY
The ability to react to cryptographic threats quickly, at a systems level it bridges the gap between current and quantum-safe security methods.
Today ?
Quantum-safe Cryptography
Current Public Key Cryptography
Crypto-agile solutions = current + quantum-safe
NIST ON CRYPTO-AGILITY
“As the replacements for currently standardized public key algorithms are not yet ready, a focus on maintaining crypto agility is imperative.
Until new quantum-resistant algorithms are standardized, agencies should continue to use
the recommended algorithms currently specified in NIST standards.”
- “Report on Post-Quantum Cryptography”, NIST, April 2016
PKI MIGRATION EXAMPLE
There’s more than 4.5 million active users in the DoD identity management system.
Creating a quantum-safe duplicate infrastructure is time-consuming and cost prohibitive.
Classical
Classical
Quantum-Safe
Quantum-Safe
Multiple digital identities =
User/server needs to select which one to use
Without Crypto-Agile Certificates…
One classical/quantum-safe certificate for…
- Faster migration- Interoperable- Reduced switching costs
No end-user interaction with certificates.
Classical+
Quantum-Safe
Classical+
Quantum-Safe
Agile Quantum-Safe Certificates:Seamless Integration, Faster Migration
Classical
We’re shapingQUANTUM-SAFE SOLUTIONS
ISARA Radiate™ Security Solution SuiteQuantum-Safe Algorithms, Integration Tools & Agile Technologies
LEADINGGLOBAL STANDARDS
GENERATING AWARENESS &
GOVERNMENT ADVOCACY
Web Security
Secure Communications
Cloud Security
Industrial / IoT Security
Identity & AccessManagement
CREATING QUANTUM-SAFE SOLUTIONS WITH SECURITY SOLUTION PROVIDERS/OEMs
PROTECTINGEND-USERS
23
QUANTUM-SAFE SECURITY AS A STRATEGIC ENABLER
www.isara.comJoin us on social
@ISARACorp @ISARACorp @ISARACorporation
CLEARING THE PATH TOQUANTUM-SAFE SECURITY