Ericsson: Companies Should Prepare for Post-Quantum Encryption
Communication companies should prepare now for the threat from quantum computing, which can break the cryptography that protects data from attacks, Taylor Hartley, network security solutions architect at Ericsson North America, said during an IEEE webinar Wednesday. “Anything that utilizes…
Sign up for a free preview to unlock the rest of this article
If your job depends on informed compliance, you need International Trade Today. Delivered every business day and available any time online, only International Trade Today helps you stay current on the increasingly complex international trade regulatory environment.
a public key can easily be broken by a quantum computer,” Hartley said. “We definitely have reason to believe” bad actors are gathering encrypted data so that they will be able to unencrypt it one day, she said. Hartley recommended migrating weakened algorithms to post-quantum cryptograpy. The National Institute of Standards and Technology ran a contest and selected the first three algorithms found to be quantum resistant, she said. It's expected the three will be standardized this summer and “then we can start implementing them,” Hartley said. The concept of quantum computing started in the 1980s, and we’ve known since the 1990s that it could “break the cryptography that we use today,” she said. The first commercially available quantum computer was introduced in 2011, she said. Recently, companies like IBM, Google and Honeywell have made advances in quantum computing, she said. Hartley recommended starting a "quantum readiness road map, conducting inventories, applying risk assessments and analysis and engaging with your vendors.”