FB pixel

Looming quantum event gives rise to the need for cryptoagility, post-quantum prep

So-called Q2K scenario has no fixed time but the time to get ready is now: Teresa Wu
Looming quantum event gives rise to the need for cryptoagility, post-quantum prep
 

For a few years now, the cybersecurity community has had its own version of Y2K, the calendar change that threatened to take down global IT infrastructure. This time it’s not a date issue, but rather the massive implications of quantum computing, which theoretically could make traditional encryption schemes obsolete. Terms like “post-quantum cryptography” (PKC, curiously enough) and “cryptoagility” are entering the digital identity lexicon, as providers prepare for the emergence of computers that can process vast amounts of information at previously impossible speeds.

And it’s happening faster than many expected. Microsoft recently unveiled Majorana 1, which it calls the world’s first Quantum Processing Unit (QPU) powered by a “Topological Core,” designed to scale to a million qubits on a single chip. This kind of power gives computers the ability to calculate what was previously incalculable.

In a presentation at the Secure Technology Alliance’s Identity and Payments Summit, Idemia’s VP of smart credentials, Teresa Wu, is blunt: without active preparation, we are in a lot of trouble. Meeting the challenge will require increased collaboration between physical security and digital security teams that currently operate in silos, as well as a host of tools and technologies to ensure the best possible security posture.

In the new world of cybersecurity, “every single employee is an attack surface,” Wu says. As such, enterprises need to adapt, which means letting go of outdated models and facing the reality of the situation. Fraud-as-a-service models, deepfakes, generative AI and the quantum capability for vastly improved computing speeds have accelerated the need to make changes that Wu says are long overdue, anyway.

Curse the password, broken-down jalopy of security tools

For one thing, “passwords need to be gone,” she says, comparing the 60-year-old ID security technology to a car of similar vintage. Cryptoagility means embracing passkeys, which are unphishable and increasingly supported. Mobile driver’s licenses (mDL) are a piece of the puzzle – but not, says Wu, in isolation: mDL and identity verification are not an either-or thing. For ID verification, biometrics now absolutely need liveness detection; as to whether or not to use passive or active, says Wu, why not both?

Wu displays a graphic of nesting circles that has mDL at the center, followed in concentric layers by mID, identity wallets, digital verifiable credentials and – the outlet layer – digital identity.

Prepare to be nimble as quantum capabilities improve, standards evolve

The overarching point is that security is more fluid than ever, and cryptographic algorithms that can withstand the quantum transformation are young. Wu says that for the next 10-15 years, with extensive real-world deployment, vulnerabilities may appear. While some algorithms could prove less secure than anticipated, standards will be evolving in tandem.

Wu refers to the development of increasingly advanced defenses against the quantum threat as a cat and mouse game. She says as soon as a vulnerability is discovered, algorithms must be updated, including physical credentials and devices. And there must be the ability to decouple encryption algorithms from workflows in cases when an algorithm needs to be changed.

Her recommendations for a strengthened security posture include developing gen-AI-resistant employee onboarding, adaptive authentication that continuously monitors for risks, and eliminating those moldy old passwords. Get ahead of the curve, she says – and if you have a tool at your disposal, use it!

While Wu’s presentation dangles the specter of a “Y2Q” scenario, others advocating for cryptoagility say the quantum leap is not likely to be a singular event. In a separate summit panel, Johannes Lintzen, director of business development for PQShield, says “it’s going to be more of a moving thing. But the transition is already in full swing.”

Only the nimble are likely to survive. In the meantime, says Lintzen, “be proactive, but take your time. Find people to talk to about it.” Understand what is ahead and plan accordingly – or, metaphorically, don’t wait to put new tires on your car until after they’ve caused you to crash.

 

Related Posts

Article Topics

 |   |   |   |   |   |   |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events