aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Computing
  • Design
  • Engineering
  • Technology

Here’s why it’s important to build long-term cryptographic resilience

  • aster.cloud
  • December 24, 2024
  • 5 minute read

The UN has proclaimed 2025 to be the International Year of Quantum Science and Technology — cryptographic security is more important than ever.

  • Quantum computing’s rapid progress, marked by breakthroughs in qubit technology and post-quantum cryptography (PQC) standards, promises transformative benefits.
  • This does pose potential threats, however.
  • Organizations must adopt cryptographic agility to address vulnerabilities while building defense-in-depth frameworks to ensure layered protection.

The UN has proclaimed 2025 to be the International Year of Quantum Science and Technology. With increased qubit counts, improvements in error correction and cloud access to quantum platforms, we saw many practical gains in quantum computing in 2024. As progress accelerates, industries are exploring applications where quantum computing can solve challenges beyond the capabilities of advanced classical computers and AI, such as modeling complex molecular interactions.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

While quantum computing promises many benefits, its rapid advancement also poses a significant threat to the current cryptographic applications and infrastructures upon which the global economy relies.

As we stand on the brink of a quantum revolution, the urgent need to migrate our cryptographic infrastructure to a quantum-safe framework has never been more critical to ensure the security, privacy and availability of global digital communications.

Cryptography is an indispensable cybersecurity control providing confidentiality and integrity for information, systems and communications. In the 1990s, public key cryptography revolutionized our digital infrastructure by enabling secure and confidential communication over the internet, allowing for the safe exchange of information, digital signatures and the establishment of trust in online transactions without the need for a shared secret key. Today, we rely on cryptography more than ever before. However, a sufficiently powerful quantum computer could render much of our traditional cryptography obsolete.

Read More  Looking Back On KubeCon + CloudNativeCon North America 2022

On August 13, 2024, the US National Institute of Standards and Technology (NIST) announced three post-quantum cryptography (PQC) standards designed to replace current public key standards. This announcement marked a significant first step toward achieving cryptographic security in the quantum age, following eight years of dedicated international collaboration.

While PQC is crucial for safeguarding our digital future, the real challenge lies in effective risk management and implementing a more robust, proactive approach to protecting data, systems and infrastructure from all evolving threats. AI and quantum computing significantly enhance the capabilities of malicious actors, exacerbating the challenge of maintaining secure cryptographic solutions. To create a resilient cryptographic framework for both the present and future, it is crucial to consider all quantum-safe technologies and develop solutions that promote agility and the principles of defence in depth.

Cryptographic agility implies the ability to quickly respond to an algorithm being broken by switching to an alternative with minimal disruption. Because PQC algorithms are relatively new, crypto-agility is a key pillar of resilience in the quantum age. But agility won’t prevent losses and damage incurred before a break is detected and the switch is eventually made. The second pillar is a defence-in-depth approach, employing multiple security layers to prevent catastrophic outcomes should any one point of security fail. By implementing such a resilient cryptographic infrastructure, organizations can enhance their security posture, providing robust protection against a wide array of potential vulnerabilities. This strategy not only prepares organizations for the quantum future but also strengthens their defences against current and unforeseen challenges.

Many government entities and global businesses are advocating this multi-pronged approach. The US National Security Agency (NSA)’s Commercial Solution for Classified program specifies the use of symmetric key solutions using pre-shared keys as a substitute for or in conjunction with public key cryptographic solutions, especially when long-term data protection is required. The Monetary Authority of Singapore issued an advisory to financial institutions recommending that, in addition to PQC, they explore complementary quantum-safe strategies such as Quantum Key Distribution (QKD). JPMorgan Chase and other organizations across critical industries are also pursuing such a dual-remediation strategy.

Read More  Break Down Data Silos With The New Cross-Cloud Transfer Feature Of BigQuery Omni

As highlighted in the joint statement by 18 EU nations, Securing Tomorrow, Today: Transitioning to Post-Quantum Cryptography, “organizations and governments should start the transition now.” NIST has recognized that, historically, it has taken 10 to 20 years to fully implement cryptographic migrations. Compared to previous migrations, cryptographers worldwide have emphasized that transitioning to a quantum-safe infrastructure presents a far more complex challenge. Instead of merely swapping out algorithms, this transition requires revamping key management solutions, communication protocols, applications and systems that rely on or incorporate cryptography.

The stakes of a quantum-enabled cyber attack are potentially existential for businesses and exacerbated by the systemic nature of cryptographic vulnerabilities. It is imperative for senior business leaders to collectively champion the transition to a quantum-safe and resilient cryptographic infrastructure as a business requirement and empower their cybersecurity, IT, innovation and other teams to achieve it together. This strategic shift not only safeguards an organization’s data and systems but also reinforces trust and confidence among customers and stakeholders. It also protects the organization from the risk of non-compliance as regulatory standards evolve. By taking ownership of this transition and working with technology experts to understand the organization’s path to quantum safety, leaders can ensure that their businesses remain secure and resilient.

Because of the complexity of cryptographic migrations and the speed at which quantum computing is progressing, leaders must consider that they may not have an advanced warning of cryptographic failure. In April 2024, a paper was published purporting to have identified a vulnerability in lattice cryptography, a family of algorithms central to PQC. The claim was eventually disproved, but the possibility remains that unforeseen weaknesses in PQC could one day be exploited.

Read More  Come Build With Us: Microsoft And OpenAI Partnership Unveils New AI Opportunities

For that reason, business executives and security leaders must collaborate to probe the full extent of their resilience beyond merely adopting PQC algorithms and begin this process now. To guide this discovery phase, leaders should be asking:

  • What are the implications for our organization if new PQC algorithms are broken without advanced warning?
  • Do we have sufficient defence in depth so that short-term losses and disruptions would be survivable? Do we have alternative cryptographic capabilities to support our needs and protect our data?
  • Do we have a recovery strategy that allows us to return to full operation in an acceptable amount of time?

Building a resilient cryptographic infrastructure and preparing for a world comprised of quantum computers and advanced AI is a long-term and ongoing endeavour requiring continual reassessment. Executives must initiate this transition now to ensure preparedness for future challenges. By embracing the long-term imperative of building a resilient and quantum-safe cryptographic infrastructure, organizations can secure their operations and maintain trust with stakeholders in an evolving digital landscape they can more aggressively capitalize on in the short-term.

Image credits: Unsplash

By: Michele Mosca (Chief Executive Officer, evolutionQ) and Donna Dodson (Senior Strategist, evolutionQ)
Originally published at: World Economic Forum

Source: zedreviews.com


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Cryptographic
  • Quantum Computing
  • Security
You May Also Like
oracle-ibm
View Post
  • Hybrid Cloud
  • Technology

IBM and Oracle Expand Partnership to Advance Agentic AI and Hybrid Cloud

  • May 6, 2025
Getting things done makes her feel amazing
View Post
  • Computing
  • Data
  • Featured
  • Learning
  • Tech
  • Technology

Nurturing Minds in the Digital Revolution

  • April 25, 2025
View Post
  • People
  • Technology

AI is automating our jobs – but values need to change if we are to be liberated by it

  • April 17, 2025
View Post
  • Software
  • Technology

Canonical Releases Ubuntu 25.04 Plucky Puffin

  • April 17, 2025
View Post
  • Computing
  • Public Cloud
  • Technology

United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services

  • April 15, 2025
View Post
  • Technology

Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology

  • April 2, 2025
View Post
  • Software
  • Technology

IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management

  • March 27, 2025
View Post
  • Technology

IBM contributes key open-source projects to Linux Foundation to advance AI community participation

  • March 22, 2025

Stay Connected!
LATEST
  • notta-ai-header 1
    Notta vs Otter: Which AI Transcription Tool Has the Edge in 2025? (HackerNoon)
    • May 16, 2025
  • college-of-cardinals-2025 2
    The Definitive Who’s Who of the 2025 Papal Conclave
    • May 7, 2025
  • conclave-poster-black-smoke 3
    The World Is Revalidating Itself
    • May 6, 2025
  • oracle-ibm 4
    IBM and Oracle Expand Partnership to Advance Agentic AI and Hybrid Cloud
    • May 6, 2025
  • 5
    Conclave: How A New Pope Is Chosen
    • April 25, 2025
  • Getting things done makes her feel amazing 6
    Nurturing Minds in the Digital Revolution
    • April 25, 2025
  • 7
    AI is automating our jobs – but values need to change if we are to be liberated by it
    • April 17, 2025
  • 8
    Canonical Releases Ubuntu 25.04 Plucky Puffin
    • April 17, 2025
  • 9
    United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services
    • April 15, 2025
  • 10
    Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology
    • April 2, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management
    • March 27, 2025
  • 2
    Tariffs, Trump, and Other Things That Start With T – They’re Not The Problem, It’s How We Use Them
    • March 25, 2025
  • 3
    IBM contributes key open-source projects to Linux Foundation to advance AI community participation
    • March 22, 2025
  • 4
    Co-op mode: New partners driving the future of gaming with AI
    • March 22, 2025
  • 5
    Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience
    • March 10, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.