FB pixel

Looming quantum event gives rise to the need for cryptoagility, post-quantum prep

So-called Q2K scenario has no fixed time but the time to get ready is now: Teresa Wu
Looming quantum event gives rise to the need for cryptoagility, post-quantum prep
 

For a few years now, the cybersecurity community has had its own version of Y2K, the calendar change that threatened to take down global IT infrastructure. This time it’s not a date issue, but rather the massive implications of quantum computing, which theoretically could make traditional encryption schemes obsolete. Terms like “post-quantum cryptography” (PKC, curiously enough) and “cryptoagility” are entering the digital identity lexicon, as providers prepare for the emergence of computers that can process vast amounts of information at previously impossible speeds.

And it’s happening faster than many expected. Microsoft recently unveiled Majorana 1, which it calls the world’s first Quantum Processing Unit (QPU) powered by a “Topological Core,” designed to scale to a million qubits on a single chip. This kind of power gives computers the ability to calculate what was previously incalculable.

In a presentation at the Secure Technology Alliance’s Identity and Payments Summit, Idemia’s VP of smart credentials, Teresa Wu, is blunt: without active preparation, we are in a lot of trouble. Meeting the challenge will require increased collaboration between physical security and digital security teams that currently operate in silos, as well as a host of tools and technologies to ensure the best possible security posture.

In the new world of cybersecurity, “every single employee is an attack surface,” Wu says. As such, enterprises need to adapt, which means letting go of outdated models and facing the reality of the situation. Fraud-as-a-service models, deepfakes, generative AI and the quantum capability for vastly improved computing speeds have accelerated the need to make changes that Wu says are long overdue, anyway.

Curse the password, broken-down jalopy of security tools

For one thing, “passwords need to be gone,” she says, comparing the 60-year-old ID security technology to a car of similar vintage. Cryptoagility means embracing passkeys, which are unphishable and increasingly supported. Mobile driver’s licenses (mDL) are a piece of the puzzle – but not, says Wu, in isolation: mDL and identity verification are not an either-or thing. For ID verification, biometrics now absolutely need liveness detection; as to whether or not to use passive or active, says Wu, why not both?

Wu displays a graphic of nesting circles that has mDL at the center, followed in concentric layers by mID, identity wallets, digital verifiable credentials and – the outlet layer – digital identity.

Prepare to be nimble as quantum capabilities improve, standards evolve

The overarching point is that security is more fluid than ever, and cryptographic algorithms that can withstand the quantum transformation are young. Wu says that for the next 10-15 years, with extensive real-world deployment, vulnerabilities may appear. While some algorithms could prove less secure than anticipated, standards will be evolving in tandem.

Wu refers to the development of increasingly advanced defenses against the quantum threat as a cat and mouse game. She says as soon as a vulnerability is discovered, algorithms must be updated, including physical credentials and devices. And there must be the ability to decouple encryption algorithms from workflows in cases when an algorithm needs to be changed.

Her recommendations for a strengthened security posture include developing gen-AI-resistant employee onboarding, adaptive authentication that continuously monitors for risks, and eliminating those moldy old passwords. Get ahead of the curve, she says – and if you have a tool at your disposal, use it!

While Wu’s presentation dangles the specter of a “Y2Q” scenario, others advocating for cryptoagility say the quantum leap is not likely to be a singular event. In a separate summit panel, Johannes Lintzen, director of business development for PQShield, says “it’s going to be more of a moving thing. But the transition is already in full swing.”

Only the nimble are likely to survive. In the meantime, says Lintzen, “be proactive, but take your time. Find people to talk to about it.” Understand what is ahead and plan accordingly – or, metaphorically, don’t wait to put new tires on your car until after they’ve caused you to crash.

 

Related Posts

Article Topics

 |   |   |   |   |   |   |   | 

Latest Biometrics News

 

Calls for national standards grow as U.S. AI action plan takes shape

On February 6, the National Science Foundation’s (NSF) Networking and Information Technology Research and Development National Coordination Office (NCO) issued…

 

DOGE’s influence at SSA triggers legal and congressional scrutiny

An affidavit in support of an amended complaint and motion for emergency relief to halt Elon Musk’s so-called Department of Government Efficiency’s…

 

UK Online Safety Act passes first enforcement deadline, threatening big fines

One of the main reasons regulations are not especially popular among ambitious CEOs is that they can cost money. This…

 

Digital ID, passkeys are transforming Australian government services

Tax has gone digital in Australia, where businesses now need to use the Australian Government Digital ID System to verify…

 

Biometrics ‘the lynchpin of where gaming companies need to be,’ says gambling executive

Online gambling continues to be a fruitful market for biometrics providers, as betting platforms seek secure and frictionless KYC, onboarding,…

 

Surveillance, identity and the right to go missing

By Professor Fraser Sampson, former UK Biometrics & Surveillance Camera Commissioner Do we have a right to go missing? The global…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events