{"id":4221,"date":"2019-07-22T15:38:14","date_gmt":"2019-07-22T18:38:14","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=4221"},"modified":"2019-07-22T15:38:14","modified_gmt":"2019-07-22T18:38:14","slug":"csa-prepara-empresas-para-amenazas-de-ciberseguridad-de-computacion-cuantica","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=4221","title":{"rendered":"CSA prepara empresas para amenazas de ciberseguridad de computaci\u00f3n cu\u00e1ntica"},"content":{"rendered":"<p>El \u00faltimo paper de Cloud Security Alliance (CSA) lleva la computaci\u00f3n cu\u00e1ntica y la ciberseguridad a la vanguardia de las mentes de los l\u00edderes empresariales.<!--more--><\/p>\n<p>As the quantum age draws nearer, discussions on how to utilise the technology and, most importantly, protect organisations against the risks it poses are moving out of the hypothetical and into the practical. Part of this process is to educate key stakeholders about these opportunities and threats; something we discussed after the Hudson Institute released a guide\u00a0<a href=\"https:\/\/www.idquantique.com\/business-leaders-offered-guidance-on-quantum-secure-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">offering business leaders guidance on quantum-secure cybersecurity<\/a>.<\/p>\n<p>To continue this awareness drive, the Quantum-Safe Security working group of the Cloud Security Alliance (CSA), co-chaired by IDQ\u2019s Bruno Huttner, has released \u2018<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/preparing-enterprises-for-the-quantum-computing-cybersecurity-threats\/\" target=\"_blank\" rel=\"noopener noreferrer\">Preparing Enterprises for the Quantum Computing Cybersecurity Threats<\/a>\u2019. The paper looks to inform enterprise leadership and cybersecurity experts of the actions they must take in order to protect their organisations from impending quantum threats. It does this by answering some of the biggest questions around the subject, before outlining six key steps \u2013 spanning both technology and people \u2013 that leadership must take to ensure their security is prepared for the quantum age.<\/p>\n<p><strong><span class=\"mega-lead\">The impact of quantum computing on cryptography<\/span><\/strong><\/p>\n<p>The paper begins by conveying both the benefits and risks of quantum computing; highlighting the challenges that must be overcome. One such challenge is that faced by current cryptographic methods; while the paper reports that quantum computing\u2019s impact on symmetric encryption and hash functions can be mitigated by larger key sizes and outputs, the same is not true of asymmetric encryption.<\/p>\n<p>The CSA states that this technique, used in public key infrastructure (PKI), will face catastrophic consequences as a quantum computer with enough qubits will be able to crack the algorithms currently in use. This means that the likes of RSA, DSA and elliptic curve are all vulnerable to attack.<\/p>\n<p>The paper goes on to discuss why the time to prepare for the quantum age is now, citing key research that shows the history behind quantum resistant cybersecurity and explaining why leadership teams need to plan for a cybersecurity landscape that features quantum computers. While the timeframe for a mainstream device is not exactly known yet, the report demonstrates why organisations must begin the lengthy upgrade process now, in order to avoid both \u2018live\u2019 and \u2018harvest and decrypt\u2019 quantum attacks.<\/p>\n<p>Lastly, the paper discusses the cybersecurity industry\u2019s response to this emerging threat, giving NIST\u2019s drive to standardise quantum-resistant public key algorithms. This process is continuing, and NIST expects draft standards to be available between 2022-24.<\/p>\n<p><strong><span class=\"mega-lead\">Preparing for the post-quantum era<\/span><\/strong><\/p>\n<p>The CSA then provides practical advice on the actions that enterprises should take in order to ready their quantum cybersecurity strategy. It describes six key steps:<\/p>\n<ol>\n<li><strong>Acknowledge the severe impact of a powerful quantum computer on cryptography:<\/strong>\u00a0As a precursor to actively mitigating quantum computing risks, organisations must first acknowledge quantum computing as a threat; indeed one that could become active in as little as five years.<\/li>\n<li><strong>Inventory impacted IT assets:<\/strong>\u00a0A quantum attack could focus on data at rest as well as in motion, and target everyday hardware, software and IoT devices alongside the communications infrastructure itself. A quantum computer has the potential to impact each of these devices differently, so organisations must ensure rigorous inventory of their IT assets and understand the risks.<\/li>\n<li><strong>Pursue cryptographic agility:<\/strong>\u00a0Cryptographic agility refers to how nimble organisations are to replace existing crypto algorithms with newer ones. As time goes by and existing algorithms degrade or become vulnerable, it\u2019s key that enterprises can adopt new primitives quickly. To help ensure agility, the paper recommends that organisations ask vendors to share their quantum-resistant product roadmap.<\/li>\n<li><strong>Implement hybrid cryptography:<\/strong>\u00a0To protect against both classical and quantum attack, the paper suggests implementing a hybrid cryptography solution. A hybrid approach combines different types of solution, for example a classical and a quantum security principal, such as\u00a0<a href=\"https:\/\/www.idquantique.com\/quantum-safe-security\/overview\/qkd-technology\/\" target=\"_blank\" rel=\"noopener noreferrer\">Quantum Key Distribution (QKD)<\/a>. This approach is especially useful for enterprises who store sensitive data for long periods of time, as this information would be secured against attacks whereby encrypted data is stolen today and cracked using a quantum computer once it is commercially available.<\/li>\n<li><strong>Explore the use of alternative technologies:<\/strong>\u00a0The paper suggests enterprises look to build layers of defence through alternative technologies. Examples of such innovations include data tokenization and certain types of zero-knowledge proof systems which can then be combined with conventional quantum-resistant technologies.<\/li>\n<li><strong>Plan on building organisation capacity in quantum computing and quantum technologies:<\/strong>\u00a0Alongside technologies, the paper also advocates enterprises growing skills and knowledge around quantum computing. This can be done by training existing staff and employing people with a background in quantum physics, mathematics and classical and quantum programming languages.<\/li>\n<\/ol>\n<p><strong><span class=\"mega-lead\">Starting the quantum journey today<\/span><\/strong><\/p>\n<p>The paper concludes by reaffirming the need for enterprise leadership to begin taking these steps and addressing these challenges today, as delaying them until tomorrow could mean that it is too late.<\/p>\n<p>\u201cMonitoring the development of quantum computing stack, the standardization of post-quantum cryptography by NIST and the implementation of alternative cryptographic methods is imperative for all stakeholders. Although a quantum computer capable of cracking RSA will likely not arrive for another decade or more, the consequences of inaction are so dire that cybersecurity professionals and decisionmakers should plan and act now.\u201d<\/p>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"https:\/\/www.idquantique.com\/csa-prepares-enterprises-for-quantum-computing-cybersecurity-threats\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.idquantique.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El \u00faltimo paper de Cloud Security Alliance (CSA) lleva la computaci\u00f3n cu\u00e1ntica y la ciberseguridad a la vanguardia de las mentes de los l\u00edderes empresariales.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4221"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4221"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4221\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}