Scroll Top

Start moving to quantum safe cryptography now White House tells feds

Futurist_hacked

WHY THIS MATTERS IN BRIEF

What if there was a powerful enough computer platform emerging which could crack 70% of global encryption in minutes and reveal your secrets? Worried? Then read on …

 

Love the Exponential Future? Join our XPotential Community, future proof yourself with courses from XPotential University, read about exponential tech and trendsconnect, watch a keynote, or browse my blog.

Years, perhaps even decades on from the original realisation that one day powerful quantum computers could crack over 70% of all the worlds encryption in minutes, for 256 Bit encryption, or in just 8 hours for 2,048 Bit encryption, the White House’s Office of Management and Budget (OMB) has finally released their first memorandum outlining the need for federal agencies’ “to begin the migration to post-quantum cryptography ahead of the onset of operational quantum computers.”

 

RELATED
Crypto firm Maker goes nuclear with Uranium backed stablecoin

 

And, bearing in mind that according to organisations like National Institute of Standards and Technology it takes organisations up to 15 years to change their encryption systems and that quantum computers in 2025 should be able to crack encryption you could say the memorandum, as with most new government technology policies, is very late to the party.

 

The Future of Cyber Insecurity, by keynote Matthew Griffin

 

Preparatory measures the OMB recommends federal entities follow the lead of President Joe Biden’s earlier executive order enhancing the US’s cyber defense posture. The new memo establishes requirements for federal agencies to inventory their current cryptographic hardware and software systems, emphasizing high value assets and high impact systems that demand extra cybersecurity protocols.

Agency leadership will then be tasked with compiling this information in a report containing their individual summaries on higher risk information assets and systems for the Office of the National Cyber Director and Cybersecurity and Infrastructure Security Agency to help budget, plan, and execute the transition from standard to effective post-quantum cryptography.

 

RELATED
The size of a grain of rice, researchers unveil the world's smallest computers

 

OMB officials specify that the high-risk systems submitted by agencies will primarily handle sensitive data that can be exploited by any quantum hacking attempts.

“The Biden-Harris Administration is working to ensure US leadership in the emerging field of quantum computing,” Chris DeRusha, the federal chief information security officer, told reporters in a statement. “This global technology race holds both great promise and threats. We are prioritizing our efforts to secure the Federal Government’s sensitive data against potential future compromise by quantum computers; this action signifies the start of a major undertaking to prepare our Nation for the risks presented by this new technology.”

Agencies will have until May 4, 2023 to complete OMB’s request. Within 30 days of the memo’s release, agencies will be tasked with designated a lead for collecting cryptographic systems information. OMB will continue releasing instructions for the collection of the systems inventory.

 

RELATED
Hackers use data science to evade state of the art AI cybersecurity systems

 

According to a statement from OMB the migration to post-quantum cryptographic standards will be the most significant to date, and take several years to complete. And let’s face it a goal of seven years in the federal sector really means over a decade in the real world.

Within one year of this new memo’s publication, CISA will help release new strategies for migration, in conjunction with the NIST and the National Security Agency (NSA).

OMB recommended that as they inventory their information systems, federal agencies should collaborate with software vendors to identify post quantum cryptography testing opportunities within their networks, speaking to the Biden administration’s push for public-private sector collaboration.

Several federal agencies have been working in tandem to push the post-quantum migration in government digital networks. NIST previously released four quantum-resistant algorithms to facilitate and expedite updating current code, one of which then got cracked with basically a bloke and his laptop … but, despite that, these will be part of NIST’s ongoing Post-Quantum Cryptography initiative, which is expected to be finalized within two years.

Related Posts

Comments (1)

[…] included one frightening possibility: that China had developed a quantum supercomputer, capable of cracking all Western encryption and rendering cyber defences […]

Leave a comment

EXPLORE MORE!

1000's of articles about the exponential future, 1000's of pages of insights, 1000's of videos, and 100's of exponential technologies: Get The Email from 311, your no-nonsense briefing on all the biggest stories in exponential technology and science.

You have Successfully Subscribed!

Pin It on Pinterest

Share This
503 Service Unavailable

Service Unavailable

The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later.

Additionally, a 503 Service Unavailable error was encountered while trying to use an ErrorDocument to handle the request.