The Quantum Computing Threat (2024)

The Quantum Computing Threat

Updated on

Dec 8, 2023

Focus

Download PDF

Updated on

Dec 8, 2023

Focus

  1. Home
  2. Network Security
  3. Quantum Security Concepts
  4. The Quantum Computing Threat

Download PDF

Network Security

Table of Contents

Previous Quantum Security Concepts
Next How RFC 8784 Resists Quantum Computing Threats

Quantum computers will break classical cryptography with threats including harvest now, decrypt later attacks.

Where Can I Use This?

What Do I Need?

  • PAN-OS

  • PAN-OS 11.1 or later.

Public Key Infrastructure (PKI) encryption and IKE key exchange mechanisms use classical cryptographies such as Diffie-Hellman (DH), Elliptic Curve Cryptography (ECC), and Elliptic Curve Diffie-Hellman (ECDH) extensively. Quantum computers (QCs) are likely to break these technologies within 5-15 years of NIST's standardization of the first post-quantum cryptographies (PQCs).

Post-quantum IKEv2 VPNs based on the RFC 8784, RFC 9242, and RFC 9370 open standards resist attacks based on quantum computing and PQCs. With RFC 8784, instead of sending the key material to the IKE peer in the peering handshake, the administrators configure and share the key material separately, out-of-band. If attackers steal the data, they can't decrypt it because they don't have the key material. RFC 9370 adds an additional seven optional KEM rounds to IKEv2 to enable the creation of hybrid encryption keys that are formulated with different types of KEM technologies. To break the hybrid key, all the KEMs used to create the key would need to be compromised. Palo Alto Networks' solutions to resist quantum attacks are based on open standards to enable and ensure interoperability with other equipment that meets the standards.

The most immediate danger is Harvest Now, Decrypt Later attacks, where attackers steal data (at rest or in transit) that they can't decrypt now and store it until a cryptographically relevant quantum computer (CRQC) can decrypt it. A CRQC is a QC optimized for using quantum algorithms to break encryption in seconds instead of in the millions of years that a classical supercomputer would take. The data at highest risk is long-lived data that will still be relevant when CRQCs become available.

  • What Is A Quantum Computer?

  • How Does the Quantum Threat Affect My Network?

  • What to Do Now to Mitigate Harvesting Attacks

What Is A Quantum Computer?

Quantum computers (QCs) are essentially the next generation of supercomputing platforms. QCs use the laws of quantum mechanics to vastly decrease the amount of time it takes to process data and run algorithms, including algorithms that can break classical decryption. Operations that would take a classical computer hundreds or thousands of years to process take seconds or even microseconds for a QC. Instead of being based on classical bits (zeros and ones) that increase a supercomputer's power linearly, QCs use qubits, which are based on polarized photons (light) and increase a QC's processing power exponentially.

There are several ways to create qubits and the method affects qubit quality—the efficiency of the qubits. The higher the quality of the qubits, the faster and more effective the QC. Because of their quantum nature, a qubit represents two states at one time and those states can be replicated across great distances. This is due to the quantum effects of superpositioning and entanglement:

  • Superpositioning

    —A qubit can represent both a one and a zero at the same time. Combining qubits results in escalating the number of states the qubits can represent because the number of states increases at a rate of 2**n, where “n” is the number of qubits. So two qubits can represent four states (2**2), three qubits can represent eight states (2**3), four qubits can represent 16 states (2**4), etc.

    As qubit density (the number of qubits that fit on a chip) increases, the number of states that the combined qubits can represent increases exponentially. The better the quality of the qubits, the closer the combined number of qubits come to a true exponential scale. Low-quality (noisy) qubits, when combined, don’t increase the number of states exponentially, but they still increase the number of states significantly compared to a classical computer. As the quality of qubits improves, QCs come closer and closer to a true exponential escalation of the number of states represented.

  • Entanglement

    —Entanglement is a quantum bond between qubits. Entangled qubits generate the same results from running the same quantum algorithm on them, no matter where they are, even if the qubits are halfway around the world from each other. So if you run a particular algorithm on entangled qubits that are located in Bangalore (India) and Los Angeles (United States), the entangled qubits in those locations yield the same result. The exact mechanism by which quantum entanglement works is unknown.

There are three types of QCs:

  • Quantum Annealers

    —These are available today. They are the least-powerful QCs with the narrowest use cases. However, attackers can use them to factor large numbers using quantum algorithms, which is how to break asymmetric encryption.
  • Analog Quantum Simulators

    —These solve physics problems that are beyond the ability of classical computers, such as quantum chemistry, materials sciences, optimization problems, factoring large numbers, sampling, and quantum dynamics.
  • Universal Quantum Computer

    —These are the hardest QCs to build because they require many physical qubits. They solve the broadest range of use cases and several companies are targeting the end of this decade for commercializing them. When they are developed, these are the computers that will be CRQCs.

QCs create a multi-dimensional space comprised of many entangled qubits in which to solve complex problems. For example, classical computers take each element of a database, process it, and then combine it with other elements after processing all the elements. QCs create an algorithm that solves for every state and outcome you're looking for. They pass the entire database through the algorithm simultaneously, analyzing the data for every outcome simultaneously. This makes QCs potentially millions of times faster than classical computers and is one reason they are excellent at solving complex mathematical problems such as breaking encryption.

How Does the Quantum Threat Affect My Network?

The vastly increased processing power and speed of QCs threaten to break classical methods for encrypting data, which could compromise your public key infrastructure (PKI).

The most immediate threat is Harvest Now, Decrypt Later attacks that steal your encrypted data with the intention of using a CRQC to decrypt it in the future. Once attackers steal your data and classical key material, there's no way to stop them from decrypting the data in the future using a CRQC. If the stolen data is still valid at that time, it is compromised.

Classical asymmetric encryption is based on prime numbers and relies on the difficulty of factoring complex numbers to derive those prime numbers. A quantum algorithm called Shor's algorithm can factor complex numbers and solve discrete logarithm problems. Shor's algorithm threatens PKI security, which is based on two very large prime numbers to produce the key. However, Shor's algorithm can't break PKI security in less than millions of years using a classical computer. Without CRQCs, Shor's algorithm wasn't a threat. However, given the processing power of a CRQC, Shor's algorithm can factor complex numbers and crack classical asymmetrical encryption (such as the key exchange material needed to decrypt data) in seconds or less. This is why Harvest Now, Decrypt Later attacks are an immediate threat.

The consequences of breaking classical encryption include compromising the security of classical PKI cryptographies that were thought to be secure, such as Diffie-Hellman (DH), Elliptic Curve Cryptography (ECC), and Elliptic Curve Diffie-Hellman (ECDH). The key exchange is at greatest risk and is why you need to configure post-quantum IKEv2 VPNs to secure the key exchange.

Certificates have been the foundation of how two endpoints establish trust. However, CRQCs can also compromise RSA, which is used to create and secure digital certificates. This means that attackers can steal or impersonate digital signatures with a CRQC, so the server you think you're connecting to might actually be an attacker's server. The ability to do this might come as soon as the next decade.

In addition, the sheer brute force processing power of QCs means that symmetric encryption isn't safe either. Grover's algorithm is a quantum, quadratically accelerated unstructured search algorithm that finds the unique input that produces a particular output value. Grover's algorithm targets symmetric cryptography and hash functions. It essentially halves the crypto strength of AES algorithms, so if you use AES-128 bit encryption, Grover's algorithm drops it to the crypto strength of 64-bit encryption. Because classical computers don't have anywhere near enough processing power, they can't use Grover's algorithm to break symmetric encryption. However, using a QC, Grover's algorithm can break AES-128 bit encryption.

Because of AES-128 bit encryption's vulnerability to Grover's algorithm, use AES-256 bit encryption, which Grover's algorithm will not be able to break in the near or mid-term future.

To help safeguard hash functions, use SHA-384 at a minimum.

Post-quantum cryptographies (PQCs) are available today and most security-savvy people can download and set up PQCs, which can't be decrypted. If you allow unauthorized PQCs on your network, an internal bad actor could introduce PQCs into your network. If that happens, you have no visibility into traffic that uses a PQC and no visibility into threats in that traffic. Use Decryption features to detect unauthorized PQCs on your network and automatically block traffic that uses PQCs.

What to Do Now to Mitigate Harvesting Attacks

Take these actions now to resist post-quantum Harvest Now, Decrypt Later attacks. Review your VPN connections and harden them:

  • Follow RFC 6379 for

    Suite B Cryptographic Suites for IPsec

    to upgrade your VPN connections to tough cipher suites. Use Suite-B-GCM-256 and avoid weaker 128-bit AES algorithms, which are vulnerable to Grover's algorithm.

  • Upgrade your CA to 4K RSA key sizes to mitigate brute force attacks that can break smaller key sizes and migrate your VPN certificate authentication to new certificates.

  • Upgrade to higher-bit SHA hash sizes such as SHA-384 and SHA-512. Stop using weak hashes such as MD5 and SHA-1.

  • Implement RFC 8784 and/or RFC 9242 and RFC 9370 to create post-quantum VPNs that resist quantum attacks.

In addition, review your SSL/TLS connections and harden them:

  • Upgrade SSL/TLS connections to tough cipher suites; use TLSv1.3 with Perfect Forward Secrecy (PFS) ciphers.

  • Tunnel SSL/TLS sessions in hardened, client-to-server VPN sessions. Use a post-quantum desktop application to support Reverse Proxy.

"); adBlockNotification.append($( "Thanks for visiting https://docs.paloaltonetworks.com. To improve your experience when accessing content across our site, please add the domain to the allow list on your ad blocker application." )); let adBlockNotificationClose = $("x"); adBlockNotification.prepend(adBlockNotificationClose) $('body').append(adBlockNotification); setTimeout(function (e) { adBlockNotification.addClass('open'); }, 10); adBlockNotificationClose.on('click', function (e) { adBlockNotification.removeClass('open'); }) } }, 5000)

Previous Quantum Security Concepts
Next How RFC 8784 Resists Quantum Computing Threats

Recommended For You

{{ if(( raw.pantechdoctype != "techdocsAuthoredContentPage" && raw.objecttype != "Knowledge" && raw.pancommonsourcename != "TD pan.dev Docs")) { }} {{ if (raw.panbooktype) { }} {{ if (raw.panbooktype.indexOf('PANW Yellow Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Green Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Blue Theme') != -1){ }}

{{ } else { }}

{{ } }} {{ } else { }}

{{ } }} {{ } else { }} {{ if (raw.pantechdoctype == "pdf"){ }}

{{ } else if (raw.objecttype == "Knowledge") { }}

{{ } else if (raw.pancommonsourcename == "TD pan.dev Docs") { }}

{{ } else if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ } else { }}

{{ } }} {{ } }}

{{ if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } else { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } }}

{{ if (raw.pancommonsourcename != "TD pan.dev Docs"){ }} {{ if (raw.pandevdocsosversion){ }} {{ } else { }} {{ if ((_.size(raw.panosversion)>0) && !(_.isNull(raw.panconversationid )) && (!(_.isEmpty(raw.panconversationid ))) && !(_.isNull(raw.otherversions ))) { }} (See other versions) {{ } }} {{ } }} {{ } }}

{{ } }}{{ if (raw.pantechdoctype == "bookDetailPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "bookLandingPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "productLanding"){ }}

{{ } }}{{ if (raw.pantechdoctype == "techdocsAuthoredContentPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

© 2024 Palo Alto Networks, Inc. All rights reserved.

The Quantum Computing Threat (2024)
Top Articles
BBC One - Right on the Money, Series 1: Live - Experts' Top Tips
UK taxpayers risk paying too much under new tax code
Katie Pavlich Bikini Photos
Gamevault Agent
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
Things To Do In Atlanta Tomorrow Night
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Walgreens Alma School And Dynamite
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Dmv In Anoka
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Rogold Extension
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Weekly Math Review Q4 3
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Free Carnival-themed Google Slides & PowerPoint templates
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 5834

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.