SlideShare a Scribd company logo
Cryptoagility and Quantum
Resistance: Easier Said Than Done
Post Quantum Cryptography – The Impact on Identity
Dr. Carmen Kempka
Director Corporate Technology
WIBU-SYSTEMS AG
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done
To access the on-demand replay of this masterclass,
please visit
https://www.wibu.com/wibu-systems-webinars/post-
quantum-cryptography-the-impact-on-
identity/access.html
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done
The cat-and-mouse-game of cryptography
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done
Cryptography develops. So does cryptoanalysis.
3
Cryptography and quantum computers: What is broken?
Certificate
Public Key:
0011101001
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 15
Post Quantum Cryptography
Cryptographic algorithms are resistant against quantum attacks
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 16
Based on hard mathematical problems
• RSA: factoring large numbers
• ECC: discrete logarithms (DLOG)
Asymmetric cryptography
NP
Exp
P
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 17
Based on hard mathematical problems
• RSA: factoring large numbers
• ECC: discrete logarithms (DLOG)
• PQC algorithms are based on various,
different mathematical problems that are not
easily solvable by quantum computers
Asymmetric cryptography
NP
Exp
P
SVP
LWE
SIS
Lineare Codes
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 18
Based on hard mathematical problems
• RSA: factoring large numbers
• ECC: discrete logarithms (DLOG)
• PQC algorithms are based on various
mathematical problems that are not easily
solvable by quantum computers
• These mathematical problems are much
younger and less analyzed!
Asymmetric cryptography
NP
Exp
P
SVP
LWE
SIS
Analyzed for less
than 20 years
Lineare Codes
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 19
PQC Timeline
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 20
PQC Timeline
July 2022:
publication of PQC
algorithms selected
for NIST standard
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 21
PQC Timeline
July 2022:
publication of PQC
algorithms selected
for NIST standard
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done
August 2022:
candidate SIKE
broken on
classical computer
22
• RSA, ECC:
 Factoring and DLOG have been analyzed since around
300 bc (Euclid)
 High trust in security against classical attacks
− Fully broken with quantum computers – but when?
• PQC algorithms
• Mathematical problems quite new
• No known relevant attacks by classical or quantum
computers
• Situation hard to assess: not many people have expertise
in quantum computers and cryptography or the math
behind the PQC schemes
The PQC dilemma
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 23
Cryptoagility
Bildquelle: https://www.goodfreephotos.com/public-domain-images/fitting-the-last-puzzle-piece.jpg.php (Public Domain)
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 24
What do we have?
PQC
Lattice-based
Code-based
Isogenies on elliptic
curves
Multivariate
polynomials
(signatures only)
Hash-based
(signatures only)
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 25
What do we have?
PQC
Lattice-based
Code based-
Isogenies on elliptic
curves
Multivariate
polynomials
(signatures only)
Hash based-
(signatures only)
4th round
 McEliece
 BIKE
 HQC
SIKE
 SPHINCS+
State based:
 XMSS
 LMS
 Dilithium
 Falcon
 Kyber
Rainbow
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 26
Cryptoagility
The ideal world
public abstract class Encryptor {
abstract String encrypt(int publicKey, String message);
}
public class RSAEncryptor extends Encryptor {
public String encrypt (int publicKey, String message) {
<Code for encryption with RSA>
return ciphertext;
}
}
public class KyberEncryptor extends Encryptor {
public String encrypt (int publicKey, String message) {
<Code for encryption with Kyber>
return ciphertext;
}
}
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 27
Cryptoagility
The ideal world
public abstract class Encryptor {
abstract String encrypt(int publicKey, String message);
}
public class RSAEncryptor extends Encryptor {
public String encrypt (int publicKey, String message) {
<Code for encryption with RSA>
return ciphertext;
}
}
public class KyberEncryptor extends Encryptor {
public String encrypt (int publicKey, String message) {
<Code for encryption with Kyber>
return ciphertext;
}
}
Cryptoagile concept
 Modularity
 Crypto algorithms can be easily replaced if broken
 Once large enough quantum computers exist to
break our crypto algorithms, the algorithms are just
replaced by PQC algorithms – problem solved
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 28
Cryptoagility: the real world
© WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum
Resistance: Easier Said Than Done
2024-04-10 © WIBU-SYSTEMS AG 2024 29
Cryptoagility: easier said than done
• Different mathematical structures
• Large difference in memory requirements
• Very different in performance
• Very different key sizes and formats
• Developers need to learn a lot for each new algorithm
• Test vectors
• Formats
• Memory/performance trade-offs
• Which intermediate results need to be kept secret
• How to implement resistance against side channels
• Other best practices in implementation and usage
• …
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 30
How to deal with cryptoagility
• Plan with enough time and resources
• management needs to be aware of the full extent of the problem
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 32
How to deal with cryptoagility
• Threat analysis
• Find out where cryptography is used in your system and what is protected against what
• Maybe use the opportunity to re-asses your security architecture
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 33
How to deal with cryptoagility
• Identify memory and performance requirements
• Hardware requirements
• Availability requirements of cloud systems
• Response time
• Bandwidth
• …
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 34
How to deal with cryptoagility
• Flexibility
• Restructure code: you need modularity and more flexibility
• Hardcoded sizes or fixed formats could become a problem
• Maybe use the opportunity to clean up your code base
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 35
How to deal with cryptoagility
• Get experience
• Try out open source PQC libs to identify performance issues etc.
• Do research projects
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 36
How long do we have time?
When should we start integrating quantum resistant cryptography?
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 37
Mosca’s Theorem
When should we start?
Let…
…X the time for which encryption should be secure
…Y the time needed for migrating to PQC
…Z the time remaining until quantum computers are sufficiently advanced to break current cryptographic systems
Theorem (Mosca):
Source Mosca‘s Theorem: https://csrc.nist.gov/csrc/media/events/workshop-on-cybersecurity-in-a-post-quantum-world/documents/presentations/session8-mosca-michele.pdf
X
Y
Z 
If X + Y > Z, then worry
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 38
Mosca’s Theorem
When should we start?
Let…
…X the time for which encryption should be secure
…{Y1..Yn} the time needed for migrating the entire value chain to PQC
…Z the time remaining until quantum computers are sufficiently advanced to break current cryptographic systems
Theorem:
X
Z 
If X + Y > Z, then worry
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done
Y1 Y2 Y3
39
When do quantum computers start becoming dangerous
We don’t know that.
• Needed to break ECC 256: around 2330 logical qubits or several million physical qubits
• Needed to break RSA 2048: around 4096 logical qubits or several million physical qubits
• Currently existing quantum computers have a few hundred physical qubits
Seems we are still far away from having our crypto systems broken, but
everything between < 10 and > 30 years is possible
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 40
Migration to PQC
• Long-term security: combination of different algorithms
• Hybrid certificates
• Double encryption
• Cryptoagility
• Where is cryptography used in your system?
• Make cryptography updatable and replaceable
• Find a good strategy for the transition
• Identify dependencies
• Coordinate migration to PQC with suppliers and customers
• Requirements of downwards compatibility and interoperability
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 41
Europe: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
Japan: +81-45-5659710
https://www.wibu.com
info@wibu.com
Thank You!
Let’s keep in touch
2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 42

More Related Content

PPT
Uniform Domain Name Dispute Resolution
PPTX
Mixed reality
PPTX
2. History of drones
PDF
Drone sUAV Forensics
PPTX
Fortinet Icon Library
PPTX
Drone Rules 2021.pptx
PDF
Drones: Present & Future
PPTX
DRONE.pptx
Uniform Domain Name Dispute Resolution
Mixed reality
2. History of drones
Drone sUAV Forensics
Fortinet Icon Library
Drone Rules 2021.pptx
Drones: Present & Future
DRONE.pptx

What's hot (11)

PDF
ClearPass Overview
PDF
JARUS WG 4/6 Meeting: T Martin, Z Huang, A McFadyen, “Airspace Risk Managemen...
PPT
Unmanned aircraft system rules, 2020
PPT
PPT
PPTX
Drone technology
PDF
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
PPTX
Garuda Aerospace Drone - services
PPTX
Information Technology Act 2000
PPTX
AUGMENTED REALITY
PPT
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
ClearPass Overview
JARUS WG 4/6 Meeting: T Martin, Z Huang, A McFadyen, “Airspace Risk Managemen...
Unmanned aircraft system rules, 2020
Drone technology
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Garuda Aerospace Drone - services
Information Technology Act 2000
AUGMENTED REALITY
Trademarks in Cyberspace: Domain name disputes, cybersquatting and internet i...
Ad

Similar to Post Quantum Cryptography – The Impact on Identity (20)

PDF
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
PDF
Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...
PDF
Quantum threat: How to protect your optical network
PDF
Post-Quantum Cryptography - Knowing the Unknown Cyber World | USCSI®
PDF
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
PPTX
How to Quantum-Secure Optical Networks
PPTX
secure communication using quantum cryptography[1].pptx
PPTX
Post Quantum Encryption Presentation by srm.pptx
PPTX
QUANTUM CRYPTOGRAPHY. Ppt for seminar ppt x
PDF
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
PPTX
ADVA launches world’s first commercial optical transport solution with post-q...
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
PDF
The quantum age - secure transport networks
PPTX
Quantum online_Cloud_Computing-11111111111111111111111111111111.pptx
PDF
Exploring Quantum Cryptography: Next-Generation Security Protocols
PDF
What is Quantum Cryptography and Know How Does QKD Work
PPTX
Network architecture design for microservices on GCP
PPTX
Quantum computing
PDF
Domen Zavrl - Cryptography Why All Businesses Need to Prepare for 'Q-Day' As ...
PDF
Andy Kennedy - Scottish VMUG April 2016
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...
Quantum threat: How to protect your optical network
Post-Quantum Cryptography - Knowing the Unknown Cyber World | USCSI®
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
How to Quantum-Secure Optical Networks
secure communication using quantum cryptography[1].pptx
Post Quantum Encryption Presentation by srm.pptx
QUANTUM CRYPTOGRAPHY. Ppt for seminar ppt x
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
ADVA launches world’s first commercial optical transport solution with post-q...
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
The quantum age - secure transport networks
Quantum online_Cloud_Computing-11111111111111111111111111111111.pptx
Exploring Quantum Cryptography: Next-Generation Security Protocols
What is Quantum Cryptography and Know How Does QKD Work
Network architecture design for microservices on GCP
Quantum computing
Domen Zavrl - Cryptography Why All Businesses Need to Prepare for 'Q-Day' As ...
Andy Kennedy - Scottish VMUG April 2016
Ad

More from team-WIBU (20)

PDF
Transparency into Your Software’s True Reach
PDF
Modular Licensing and Software Protection
PDF
Optimizing license borrowing and offline license transfers
PDF
Mastering License Project Management Webinar
PDF
Mastering Feature-Based Licenses - Bundles and Module Items
PDF
CRA – Security with a Seal of Approval
PDF
Secure License Management for Small Devices
PDF
Hatching Ideas: Mastering Encryption and Obfuscation
PDF
Versatility in Motion - Your Perfect License.pdf
PDF
Unlocking the Future: Empowering Industrial Security
PDF
The Power of Partnership: Enabling Success Together
PDF
Unleash the Power of CodeMeter - CodeMeter Basics
PDF
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
PDF
No Time to Idle – License availability for business continuity
PDF
Cloud-Based Licensing in Offline Scenarios
PDF
Optimizing Cloud Licensing: Strategies and Best Practices
PDF
For a Few Licenses More
PDF
App Management on the Edge
PDF
Protecting and Licensing .NET Applications
PDF
A Bit of License Management Magic
Transparency into Your Software’s True Reach
Modular Licensing and Software Protection
Optimizing license borrowing and offline license transfers
Mastering License Project Management Webinar
Mastering Feature-Based Licenses - Bundles and Module Items
CRA – Security with a Seal of Approval
Secure License Management for Small Devices
Hatching Ideas: Mastering Encryption and Obfuscation
Versatility in Motion - Your Perfect License.pdf
Unlocking the Future: Empowering Industrial Security
The Power of Partnership: Enabling Success Together
Unleash the Power of CodeMeter - CodeMeter Basics
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
No Time to Idle – License availability for business continuity
Cloud-Based Licensing in Offline Scenarios
Optimizing Cloud Licensing: Strategies and Best Practices
For a Few Licenses More
App Management on the Edge
Protecting and Licensing .NET Applications
A Bit of License Management Magic

Recently uploaded (20)

PPTX
ai tools demonstartion for schools and inter college
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Transform Your Business with a Software ERP System
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
ai tools demonstartion for schools and inter college
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Understanding Forklifts - TECH EHS Solution
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Operating system designcfffgfgggggggvggggggggg
2025 Textile ERP Trends: SAP, Odoo & Oracle
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
VVF-Customer-Presentation2025-Ver1.9.pptx
Design an Analysis of Algorithms II-SECS-1021-03
CHAPTER 2 - PM Management and IT Context
Transform Your Business with a Software ERP System
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Navsoft: AI-Powered Business Solutions & Custom Software Development
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Odoo Companies in India – Driving Business Transformation.pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus

Post Quantum Cryptography – The Impact on Identity

  • 1. Cryptoagility and Quantum Resistance: Easier Said Than Done Post Quantum Cryptography – The Impact on Identity Dr. Carmen Kempka Director Corporate Technology WIBU-SYSTEMS AG 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done
  • 2. To access the on-demand replay of this masterclass, please visit https://www.wibu.com/wibu-systems-webinars/post- quantum-cryptography-the-impact-on- identity/access.html 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done
  • 3. The cat-and-mouse-game of cryptography 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done Cryptography develops. So does cryptoanalysis. 3
  • 4. Cryptography and quantum computers: What is broken? Certificate Public Key: 0011101001 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 15
  • 5. Post Quantum Cryptography Cryptographic algorithms are resistant against quantum attacks 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 16
  • 6. Based on hard mathematical problems • RSA: factoring large numbers • ECC: discrete logarithms (DLOG) Asymmetric cryptography NP Exp P 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 17
  • 7. Based on hard mathematical problems • RSA: factoring large numbers • ECC: discrete logarithms (DLOG) • PQC algorithms are based on various, different mathematical problems that are not easily solvable by quantum computers Asymmetric cryptography NP Exp P SVP LWE SIS Lineare Codes 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 18
  • 8. Based on hard mathematical problems • RSA: factoring large numbers • ECC: discrete logarithms (DLOG) • PQC algorithms are based on various mathematical problems that are not easily solvable by quantum computers • These mathematical problems are much younger and less analyzed! Asymmetric cryptography NP Exp P SVP LWE SIS Analyzed for less than 20 years Lineare Codes 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 19
  • 9. PQC Timeline 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 20
  • 10. PQC Timeline July 2022: publication of PQC algorithms selected for NIST standard 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 21
  • 11. PQC Timeline July 2022: publication of PQC algorithms selected for NIST standard 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done August 2022: candidate SIKE broken on classical computer 22
  • 12. • RSA, ECC:  Factoring and DLOG have been analyzed since around 300 bc (Euclid)  High trust in security against classical attacks − Fully broken with quantum computers – but when? • PQC algorithms • Mathematical problems quite new • No known relevant attacks by classical or quantum computers • Situation hard to assess: not many people have expertise in quantum computers and cryptography or the math behind the PQC schemes The PQC dilemma 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 23
  • 13. Cryptoagility Bildquelle: https://www.goodfreephotos.com/public-domain-images/fitting-the-last-puzzle-piece.jpg.php (Public Domain) 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 24
  • 14. What do we have? PQC Lattice-based Code-based Isogenies on elliptic curves Multivariate polynomials (signatures only) Hash-based (signatures only) 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 25
  • 15. What do we have? PQC Lattice-based Code based- Isogenies on elliptic curves Multivariate polynomials (signatures only) Hash based- (signatures only) 4th round  McEliece  BIKE  HQC SIKE  SPHINCS+ State based:  XMSS  LMS  Dilithium  Falcon  Kyber Rainbow 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 26
  • 16. Cryptoagility The ideal world public abstract class Encryptor { abstract String encrypt(int publicKey, String message); } public class RSAEncryptor extends Encryptor { public String encrypt (int publicKey, String message) { <Code for encryption with RSA> return ciphertext; } } public class KyberEncryptor extends Encryptor { public String encrypt (int publicKey, String message) { <Code for encryption with Kyber> return ciphertext; } } 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 27
  • 17. Cryptoagility The ideal world public abstract class Encryptor { abstract String encrypt(int publicKey, String message); } public class RSAEncryptor extends Encryptor { public String encrypt (int publicKey, String message) { <Code for encryption with RSA> return ciphertext; } } public class KyberEncryptor extends Encryptor { public String encrypt (int publicKey, String message) { <Code for encryption with Kyber> return ciphertext; } } Cryptoagile concept  Modularity  Crypto algorithms can be easily replaced if broken  Once large enough quantum computers exist to break our crypto algorithms, the algorithms are just replaced by PQC algorithms – problem solved 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 28
  • 18. Cryptoagility: the real world © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 2024-04-10 © WIBU-SYSTEMS AG 2024 29
  • 19. Cryptoagility: easier said than done • Different mathematical structures • Large difference in memory requirements • Very different in performance • Very different key sizes and formats • Developers need to learn a lot for each new algorithm • Test vectors • Formats • Memory/performance trade-offs • Which intermediate results need to be kept secret • How to implement resistance against side channels • Other best practices in implementation and usage • … 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 30
  • 20. How to deal with cryptoagility • Plan with enough time and resources • management needs to be aware of the full extent of the problem 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 32
  • 21. How to deal with cryptoagility • Threat analysis • Find out where cryptography is used in your system and what is protected against what • Maybe use the opportunity to re-asses your security architecture 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 33
  • 22. How to deal with cryptoagility • Identify memory and performance requirements • Hardware requirements • Availability requirements of cloud systems • Response time • Bandwidth • … 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 34
  • 23. How to deal with cryptoagility • Flexibility • Restructure code: you need modularity and more flexibility • Hardcoded sizes or fixed formats could become a problem • Maybe use the opportunity to clean up your code base 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 35
  • 24. How to deal with cryptoagility • Get experience • Try out open source PQC libs to identify performance issues etc. • Do research projects 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 36
  • 25. How long do we have time? When should we start integrating quantum resistant cryptography? 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 37
  • 26. Mosca’s Theorem When should we start? Let… …X the time for which encryption should be secure …Y the time needed for migrating to PQC …Z the time remaining until quantum computers are sufficiently advanced to break current cryptographic systems Theorem (Mosca): Source Mosca‘s Theorem: https://csrc.nist.gov/csrc/media/events/workshop-on-cybersecurity-in-a-post-quantum-world/documents/presentations/session8-mosca-michele.pdf X Y Z  If X + Y > Z, then worry 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 38
  • 27. Mosca’s Theorem When should we start? Let… …X the time for which encryption should be secure …{Y1..Yn} the time needed for migrating the entire value chain to PQC …Z the time remaining until quantum computers are sufficiently advanced to break current cryptographic systems Theorem: X Z  If X + Y > Z, then worry 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done Y1 Y2 Y3 39
  • 28. When do quantum computers start becoming dangerous We don’t know that. • Needed to break ECC 256: around 2330 logical qubits or several million physical qubits • Needed to break RSA 2048: around 4096 logical qubits or several million physical qubits • Currently existing quantum computers have a few hundred physical qubits Seems we are still far away from having our crypto systems broken, but everything between < 10 and > 30 years is possible 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 40
  • 29. Migration to PQC • Long-term security: combination of different algorithms • Hybrid certificates • Double encryption • Cryptoagility • Where is cryptography used in your system? • Make cryptography updatable and replaceable • Find a good strategy for the transition • Identify dependencies • Coordinate migration to PQC with suppliers and customers • Requirements of downwards compatibility and interoperability 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 41
  • 30. Europe: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 Japan: +81-45-5659710 https://www.wibu.com info@wibu.com Thank You! Let’s keep in touch 2024-04-10 © WIBU-SYSTEMS AG 2024 | Cryptoagility and Quantum Resistance: Easier Said Than Done 42