24 Apr 2022 3 min read

Podcast Recap: Achieving Crypto Agility with QuSecure’s CPO Rebecca Krauthamer and CTO Greg Bullard

In a recent podcast on ‘The Post Quantum World,’ with host Konstantine Karagiannis, QuSecure’s Chief Product Officer (CPO) Rebecca Krauthamer, and the Chief Technology Officer (CTO) and VP of Engineering, Greg Bullard discussed cryptographic agility and its importance in the post-quantum era. As Greg defines, cryptographic agility refers to the ability to upgrade and interchange algorithms, primitives, and encryption methods of a cybersecurity system in a seamless manner. This ability will be critical during the cybersecurity upcycle to post-quantum cryptography.

Quantum computers present a particular challenge to cybersecurity. Already, quantum computers are completing calculations orders of magnitude faster than any current classical supercomputers, and in the coming years, they will be capable of breaking modern cryptography. ‘One of the things that we know for sure is that an algorithm exists called Shor’s algorithm, which will devastate public key cryptography as we know it,’ Greg said. ‘It’s given now thanks to Shor’s algorithm and the processing capabilities of Quantum, and it’s a ticking time bomb.’ Greg explains that existing cryptography is based on prime number factorization, a mathematical computation that can be solved using Shor’s algorithm and a quantum computer. It is only time before quantum computers can break prime number factorization and modern cryptography.

The National Institute of Technology (NIST) has been developing a set of quantum-resilient algorithms to combat this threat, which will be finalized by 2024. However, upgrading systems worldwide to a new standard of quantum cybersecurity will be a massive undertaking and will require compatibility with existing systems. That’s where cryptographic agility comes in. The most critical communications and assets can be upgraded to post-quantum with minimal disruption to existing systems with crypto agility. Less essential techniques that will still be running older cryptography, such as TLS 1.3, can be managed and sequestered. According to Rebecca and Greg, ‘crypto agility gives us time.

Post-quantum cryptography companies, such as QuSecure, will play a critical role in the upcycle quantum cybersecurity. QuSecure develops software-based solutions to protect all data, both in transit at rest, from current and quantum threats. Rebecca explains further ‘We (QuSecure) help companies with use cases in Quantum, and then on the other side, we try to help them figure out what they need to do for this apocalypse that’s coming.’ To learn more about QuSecure can help you prepare for the quantum age, be sure to follow our blog or contact us here.

To watch the full podcast, visit here.

#technology#cybersecurity#cyberdefense#ciso#quantumcomputing#cyberattacks#quantum#cto#cisos#technologynews#quantumtechnology#quantumphysics#cybersecuritythreats#ctos#quantumtechnologies#cyberresiliency#quantumtech#quantumsecurity#quantumcommunication#quantumsoftware#quantumiscoming

SHARE ARTICLE

Are you ready? Contact us today.

Find out more