Circle
Events
Blog

Quantum-safe Security

Latest ResearchJoin Group
Practical Preparations for the Post-Quantum World
Practical Preparations for the Post-Quantum World

Download

Join this working group
Quantum-safe Security
Quantum computing
Researchers worldwide are working to make quantum computing a reality. Microsoft, Google, IBM, Intel, and many governments are working on building the first large-scale quantum computer. Today, RSA, Diffie—Hellman (DH) and Elliptic Curve-based are ubiquitously used for the global public key infrastructure. All of these algorithms are vulnerable to quantum attacks. Fortunately, there are alternative classes of public key algorithms developed which are believed to be resistant to quantum computing attacks.These algorithms are called post-quantum, quantum-safe, or quantum-resistant algorithms. A transition to these algorithms will provide continued protection of information for many decades to come. 

Both European and U.S. standards bodies are exploring quantum resistant (QR) cryptography.
In 2015, the European Telecommunications Standards Institute (ETSI) published a white paper urging stakeholders to begin investigating and ultimately adopting QR cryptography. In August 2015, the U.S. National Security Agency posted a notice that reinforced the need for U.S. national security systems to begin planning for the replacement of current public key cryptography with quantum resistant cryptography. In November 2017, the National Institute of Standards and Technology (NIST) concluded its call for submission of quantum-resistant cryptographic algorithms and initiated the process for review and standardization in the 2022-2025 time period. 

Cryptographic transitions take time.
The transition to quantum-resistant cryptography is likely to take at least ten years. Some quantum computing experts believe that quantum computers with the ability to break RSA and Elliptic Curve Cryptography (ECC) may be available within ten to fifteen years. It is therefore important to plan for transition as soon as possible. 

What is CSA doing to help address security for quantum computing? 
The CSA Quantum Safe Security Working Group's goal is to address key generation and transmission methods that will aid the industry in understanding quantum-safe methods for protecting their data through quantum key distribution (QKD) -- a physics‐based technology to securely deliver keys-- and post-quantum cryptography (PQC) -- mathematical algorithms that are resistant to quantum computing.

Quantum-Safe SecurityBlockchain/Distributed Ledger

The goal of this working group is to support the quantum‐safe cryptography community in development and deployment of a framework to protect data whether in movement or at rest

Next Meeting

Feb 01, 2022, 08:00AM PST
Join the Meeting



Working Group Leadership

Bruno Huttner Headshot
Bruno Huttner
Bruno Huttner

Bruno has co-chaired CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for protecting their networks and their data, for approximately six years. As such, he has participated in writing most of the group’s research papers and has given several presentations about the group’s work. Bruno joined ID Quantique in 2014, where he’s r...

Read more

Ludovic Perret Headshot
Ludovic Perret
Ludovic Perret

Co-founder

Ludovic is co-chair for CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for protecting their networks and their data.

Ludovic is the co-founder and CPO at CryptoNext Security, a spin-off from INRIA Paris and Sorbonne University specialized in post-quantum cryptography. Before founding CryptoNext Security, he was an Asso...

Read more

Join this working group

Research around Securing Quantum Computing

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

A Day Without Safe Cryptography

A Day Without Safe Cryptography

Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transactions and communications are executed, enabling businesses, education, governments, and communities to thrive and prosper. Millions of new devices are connecting to the Internet, creating, processing, and transferring digital information in greater volumes and with greater velocity than ever imagined.

Practical Preparations for the Post-Quantum World

Practical Preparations for the Post-Quantum World

This document discusses the cybersecurity challenges and recommended steps to reduce likely new risks due to quantum information sciences. This paper was created for awareness and education, and to communicate example steps every organization should be performing to prepare for the post-quantum world. Part I is a discussion of the various quantum threats which require mitigation. Part II is an actionable, step-by-step, blueprint for preparing for the post-quantum world.

Confidence in Post Quantum Algorithms

Confidence in Post Quantum Algorithms

NIST made the recent announcement of its Round 3 candidates for future post-quantum cryptography or quantum safe standards. As the world prepares to transition to post-quantum cryptography, it is essential to understand how much analysis has been done on the security of the individual post quantum algorithms and classes of algorithms.

Webinars & Resources

Practical Preparations for the Post-Quantum World

Practical Preparations for the Post-Quantum World

Join this webinar to learn more about the release titled Practical Preparations for the Post-Quantum World. During this webinar the authors of this paper will explain the steps organizations can take now to protect long-term secrets, the near-term actions needed to prepare and post-quantum alternatives to current methods.

Blockchain in the Quantum Era

Blockchain in the Quantum Era

In this webinar, Ashish Mehta, Co-chair for the Blockchain/DLT Working Group, and Bruno Huttner, Co-chair for the Quantum-safe Security Working Group, provide you with an introduction to DLT/blockchain technology, some of its representative applications, and an overview of the leading post-quantum algorithm candidates that are actively being pursued.

Blog Posts

Building Confidence in Quantum-Resistant Algorithms: How much analysis is needed?
Can Blockchains Survive the Quantum Computer?
The Quantum Threat to Cyber Security — How to Prepare for Risk Mitigation

Press Coverage

Article TitleSourceDate
Quantum Teleportation Makes Progress, But Toward What?Data Center KnowledgeFebruary 02, 2021
Beware the quantum computersThe Hindu BusinessLineApril 13, 2021