A representative from the Office of the National Cyber Director spoke on converting public and private networks to post-quantum cryptography standards and stressed the importance of data inventory in an organization’s transition to cryptographic systems. This move came after the US department of defense tightened the screws on cybersecurity compliance.
Dylan Presman, the office’s director for budget and evaluation, revealed that the framework would include instructions on post-quantum cryptography ahead of the eagerly awaited release of the first National Cybersecurity Strategy from the White House Office of the National Cyber Director.
Presman stated that the upcoming National Cyber Framework “will take a strong stand on the national quantum initiative, especially on the transition to post-quantum cryptography” when discussing the White House’s preparations to defend classical digital networks from the appearance of potent quantum computing techniques.
As traditional computers’ information processing and data security lag behind, quantum computers, which employ the principles of quantum physics to swiftly process bigger volumes of data precisely, will probably usher in a new era of cybersecurity. Presman revealed this aspect of the impending cyber architecture during a speech at a forum hosted by the Advanced Technology Academic Research Center.
He explained that because quantum physics-based technologies—specifically, quantum computing and quantum sensing—will become more prevalent in the next few years. It is high time the government and businesses must immediately protect their sensitive data. It’s not only a matter of when quantum computers will be functional, according to Presman. “It has to do with the data’s shelf life.”
According to Presman, if a company wants to permanently secure its sensitive data, such as customer or patient data, it must start using post-quantum cryptography far in advance of the development of quantum computing. As a result, private and public sector organizations will need to do an exhaustive inventory of their data even before migrating to new encryption standards.
As per NSM 10, understanding what sensitive data frequently moves through organizations’ networks is necessary for scaling a new cryptography system to evolving digital systems. Dylan Presman, the office’s director for budget and evaluation, revealed that the framework would include instructions on post-quantum cryptography ahead of the eagerly awaited release of the first National Cybersecurity Strategy from the White House Office of the National Cyber Director.
Presman stated that the next National Cyber Framework “would take a firm stand on quantum, especially on the transition” about the White House’s efforts to defend classical digital networks from the appearance of powerful quantum computing algorithms.
As traditional computers’ information processing and data security lag behind, quantum computers employ the principles of quantum physics. It will help process bigger volumes of data precisely and swiftly, and will probably usher in a new era of cybersecurity.
As per the national security memorandum 8, we must also take these actions to protect ourselves against enemies. “This is going to have incredible transformational qualities for our society and amazing prospects,” he said. Presman revealed this aspect of the impending cyber architecture during a speech at a forum hosted by the Advanced Technology Academic Research Center.
According to Presman, if a company wants to permanently secure its sensitive data, such as customer or patient data, it must start using post-quantum cryptography far in advance of the development of quantum computing. He cited bad actors’ “harvest now, decrypt later” intentions as a straightforward way to combat classical network cryptography, regardless of the existence of a quantum computer, saying that time is already running short on putting measures in place to defend our classical computing computers.
Switching systems and networks from conventional encryption to strong and safe post-quantum cryptography is crucial, as other experts in the area have previously indicated. Presman highlighted that although the federal government has employed an “all hands on deck” strategy, assigning specific tasks to organizations like the National Institute of Standards and Technology and the National Security Agency, the changeover will take some time.
He predicted upgrading networks and systems to use quantum-resistant algorithms would require a lot of time and money. “This is not a typical occurrence. Cryptographic system transitions don’t happen very frequently. Even before switching to new cryptographic standards, private and public sector organizations must take a comprehensive data inventory.
Scaling a new cryptographic system to evolving digital systems requires understanding what sensitive data often passes through organizations’ networks. In 2023 and 2024, the transition from classical to post-quantum encryption will be more obvious as NIST continues to create quantum-resistant algorithms. Presman also mentioned the release of adjacent standards, which will serve as a roadmap for enterprises’ transition processes near the end of 2023.