{"id":14429,"date":"2024-03-21T15:25:57","date_gmt":"2024-03-21T18:25:57","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=14429"},"modified":"2024-03-21T15:31:53","modified_gmt":"2024-03-21T18:31:53","slug":"la-inevitabilidad-futura-de-las-computadoras-cuanticas-es-hoy-un-problema-de-seguridad","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=14429","title":{"rendered":"La inevitabilidad futura de las computadoras cu\u00e1nticas es hoy un problema de seguridad"},"content":{"rendered":"<p>El Dr. Paul Kassebaum, director t\u00e9cnico del sector p\u00fablico de SandboxAQ , analiza la importancia y los desaf\u00edos de la criptograf\u00eda resistente a los ataques con computaci\u00f3n cu\u00e1ntica y la asociaci\u00f3n de la empresa con Microsoft y Deloitte para desarrollar una infraestructura de clave p\u00fablica (PKI) resistente a los cu\u00e1nticos para la Agencia de Sistemas de Informaci\u00f3n de Defensa (DISA) para escalar la ciberseguridad en sus redes y sistemas a la era cu\u00e1ntica.<\/p>\n<hr \/>\n<p>In this Q&amp;A with Dr. Paul Kassebaum, Technical Director of Public Sector for\u00a0<a href=\"https:\/\/bit.ly\/3TyRcTO\" target=\"_blank\" rel=\"noopener\">SandboxAQ<\/a>, we discuss the importance and challenges of quantum-resistant cryptography, and the company\u2019s teaming with Microsoft and Deloitte to develop a quantum-resistant public key infrastructure (PKI) for the Defense Information Systems Agency (DISA) to scale cybersecurity across its networks and systems into the quantum era.<\/p>\n<p><b>Breaking Defense: Describe the security challenges presented by the continued development and introduction of quantum computers.<\/b><\/p>\n<figure id=\"attachment_14430\" aria-describedby=\"caption-attachment-14430\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" class=\"size-full wp-image-14430\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2024\/03\/Dr.webp\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2024\/03\/Dr.webp 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2024\/03\/Dr-150x150.webp 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-14430\" class=\"wp-caption-text\">Dr. Paul Kassebaum is Technical Director of Public Sector for SandboxAQ.<\/figcaption><\/figure>\n<p><b>Kassebaum:\u00a0<\/b>The root cause of the challenge is the inevitability of quantum computers being able to break the most important cryptographic systems we currently rely on. I call it \u2018inevitable\u2019 because there\u2019s no known law of physics that prohibits us from building these devices, and, sure enough, progress continues to be made to improve their performance.<\/p>\n<p>There are two slightly different motivators that come from that same root cause. One is the risk of Store Now, Decrypt Later (SNDL) attacks against the confidentiality of your communications. These attacks include bad actors stealing all of your current data and information, even if it is encrypted, with the goal in mind to decrypt the data once quantum computers are available to decrypt it.<\/p>\n<p>The other motivator is the risk that the interdependent web of trust and hardware systems we rely on for authentication will take too long to migrate to quantum resistant cryptography before useful quantum computers become real.<\/p>\n<p><b>Breaking Defense: How does Zero Trust apply to the scenarios you\u2019ve described?<\/b><\/p>\n<p><b>Kassebaum:<\/b>\u00a0Zero trust writ large is like a philosophy, a set of principles that says \u2018never trust anybody or any system.\u2019 Instead, you must become completely reliant on authentication mechanisms and identity access management (IAM) systems. You have to assume that your cybersecurity firewall has been breached and you need to protect everything inside that firewall individually.<\/p>\n<p>The philosophy or principles of Zero Trust cannot be adhered to unless you have the strongest cryptography possible, so you don\u2019t have a Zero Trust system if you don\u2019t use post-quantum cryptography. In other words, cryptography will become your weakest link if you don\u2019t properly execute a Zero Trust cybersecurity posture including post quantum cryptography.<\/p>\n<p><b>Breaking Defense: Why is that your weakest link?<\/b><\/p>\n<p><b>Kassebaum:<\/b>\u00a0Let me give a recent example from the news. We read that a suite of executives who run a major IT company had their emails hacked. Russian state actors were doing what\u2019s called \u2018password spraying\u2019 by trying to guess common passwords.<\/p>\n<p>The hackers found a test email system that the company was presumably unaware of which was susceptible to email spraying. That email account had high privileges and access to important files, networks, and permissions inside the company\u2019s system.<\/p>\n<p>This is an example of not following Zero Trust principles because that email system should have had its privileges revoked after the testing was done. It only needed those high privileges during the testing and it should have immediately had those revoked once the testing was complete.<\/p>\n<p>Our cryptographic management solution called SandboxAQ Security Suite regularly monitors your cryptographic assets, such as keys, and how they\u2019re used, such as authentication processes. Our solution would\u2019ve identified how this test email system\u2019s credentials were being used, that the credentials were unusually old, raised a flag in a report, and given best practice advice on how to mitigate the risks.<\/p>\n<p>Cryptographic asset management is one of the foundations to continuously verifying that your system is actually following Zero Trust principles.<\/p>\n<p><b>Breaking Defense: In a store now, decrypt later attack, what sort of military data might have value 20 years from now?<\/b><\/p>\n<p><b>Kassebaum:<\/b>\u00a0People would be concerned about any of the advanced technologies that underpin our weapon systems such as stealth materials, navigation capabilities and sensors. For example, we see countries like Iran reverse engineering downed drones, and their process can be aided by data stolen off government networks<\/p>\n<p>This important data and others like it have a shelf life that should and has lasted many decades. These capabilities, and many more like them, have high levels of sophistication and engineering that we must protect from our adversaries to maintain a competitive advantage.<\/p>\n<p>Let me give another poignant example. The identities of Human Intelligence operatives, where they and their families live, and other sensitive information could be deciphered and put to use to harm them long after they\u2019ve retired from their jobs.<\/p>\n<p><b>Breaking Defense: DISA chose SandboxAQ for the Prototype Quantum Resistant Cryptography Public Key Infrastructure program under an OTA. Tell us about this contract.<\/b><\/p>\n<p><b>Kassebaum:<\/b>\u00a0DISA selected SandboxAQ and our partners to test core parts of a PKI resistant to cryptographic analysis and exploitation by future quantum computers, to ensure that it will perform as quickly as their current PKI at scale. A PKI is that web of trust I mentioned earlier that\u2019s critical for authentication. DISA has the largest network of machines and users of any one institution in the world, so this problem is especially exacerbated for them. And as a government agency, the pace of procurement processes make it even more important to get started migrating to a quantum-resistant PKI now.<\/p>\n<p><b>Breaking Defense: You\u2019re partnered with Microsoft and Deloitte on the DISA PKI OTA. Tell us about team responsibilities.<\/b><\/p>\n<p><b>Kassebaum:<\/b>\u00a0Microsoft and Deloitte have had decade long relationships with DISA and through this contract, Microsoft is providing our test harness and Deloitte is providing integration and services support.<\/p>\n<p><iframe loading=\"lazy\" title=\"Demystifying cryptography: PQC, QKD and quantum threats | SandboxAQ\" src=\"https:\/\/www.youtube.com\/embed\/3k6cUWs_lPU\" width=\"720\" height=\"406\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/breakingdefense.com\/2024\/03\/future-inevitability-of-quantum-computers-is-a-security-problem-today\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/breakingdefense.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Dr. Paul Kassebaum, director t\u00e9cnico del sector p\u00fablico de SandboxAQ , analiza la importancia y los desaf\u00edos de la criptograf\u00eda resistente a los ataques&hellip; <\/p>\n","protected":false},"author":1,"featured_media":14433,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/14429"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14429"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/14429\/revisions"}],"predecessor-version":[{"id":14431,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/14429\/revisions\/14431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/14433"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}