Podcast
Root Causes 233: CISA Recommendations for Post-Quantum Cryptography


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
July 13, 2022
In coordination with NIST's announcement of its new post-quantum cryptographic algorithm contest winners, the Cybersecurity and Infrastructure Security Agency released a bulletin listing six key actions for IT to commence now. We read out these six actions and put them in context.
Podcast Transcript
Lightly edited for flow and brevity.
This bulletin is called Prepare for a New Cryptographic Standard to Protect Against Future Quantum-Based Threats. Easily enough to find with a Google search and it’s not that long. It’s got just a couple of short paragraphs basically giving the background on the NIST contest and the new algorithms that are available and includes some links and then when you come out of that they’ve got this list of – it’s one, two, three, four, five, six – top level bullets with some bullets under some of them. So, again, not that complicated and you think they really tried to simple it down and skinny it down to their main takeaway. So, let’s cover what these are.
So, number one. First bullet reads as follows. I’m gonna read the paragraph above it.
“Although NIST will not publish the new post-quantum cryptographic standard for use by commercial products until 2024, CISA and NIST strongly recommend organizations start preparing for the transition now by following the Post-Quantum Cryptography Roadmap, which includes:” Bullet Number One: “Inventorying your organization’s systems for applications that use public-key cryptography.” So, Jay?
I’ll tell you what else this reflects, Tim. There was a podcast not that long ago – I forget the exact name of the podcast but we did talk about federal law that had been proposed which was going to talk about force the U.S. Federal Government to do a lot of things that are similar within the CISA guidelines here. So, I find it interesting that their first bullet point was almost identically written even to the CISA bullet point which is about what are your systems. What would those systems be? Tim, I would say from a public trust world that you well, where are your webservers. There’s one of the first things you need to go take inventory of.
Ok. Bullet Number Two: “Testing the new post-quantum cryptographic standard in a lab environment; however, organizations should wait until the official release to implement the new standard in a production environment.” So, again, there’s a lot there. A lot to unpack. So feel free to start, Jay.
Bullet number three:
“Creating a plan for transitioning your organization’s systems to the new cryptographic standard that includes:
- Performing an interdependence analysis, which should reveal issues that may impact the order of systems transition;
- Decommissioning old technology that will become unsupported upon publication of the new standard; and
- Ensuring validation and testing of products that incorporate the new standard.”
The second part about decommissioning old technologies, it makes sense. There’s going to be systems that just will never be able to upgraded. Or never be able to consume the new types of certificates and I think before you do the decommissioning the careful choice of which systems are just going to be too risky to you – and that’s the big part of the equation – how much risk is associated with this old system? If the answer comes back too much risk then you really need to decide alright, can this thing, can this older system be decommissioned. I think the hope here is that hybrid certificates will avoid the need for a lot of decommissioning in older systems. However, where I can see this happening the most, Tim, would be in operational technology, IoT, places where certificates are put into very constrained places, constrained networks, because the certificates that we are going to be using - even if they are hybrid - they are gonna be bigger. For those of you who are running systems that can barely run a certificate as it is, well then that’s where maybe we need to look but I think hybrid certificates will be the hope for reducing the amount of need for decommissioning.
Creating acquisition policies regarding post-quantum cryptography. This process should include:
- Setting new service levels for the transition.
- Surveying vendors to determine possible integration into your organization’s roadmap and to identify needed foundational technologies.
“Alerting your organization’s IT departments and vendors about the upcoming transition.”
Fair enough. You and I have spent the last three years trying to tell people, this is coming. Get prepared. I still believe that your average sysadmin either hasn’t heard of this at all or is not thinking about it in any meaningful way.
Last bullet. And this kind of builds on the bullet we just discussed.
“Educating your organization’s workforce about the upcoming transition and providing any applicable training.”
Your Linux administrator that works at a couple levels below your main IT person will have an interesting relationship to all of this because they are going to need training on how to interact with this new systems. It’s not just about taking inventory here at this point, it’s also once you’ve done the lab experiments, once you’ve actually figured out, alright, here is what my world is going to be, you need to now inform everybody whose life is going to change because, believe me, you and I both can tell you, a lot of these systems in and around publicly-trusted certificates, private world certificates authentication, authorization, these systems have been around an awfully long time and so people’s habits and job course of the day is so entrenched that as part of your inventory – again, I gotta go back to that bullet point one that is so important – you also need to be taking inventory of whose job touches these systems and what needs to be changed and so all the different transitioning bullet points we were just talking about, after getting your hands dirty, after talking to your vendors, after looking at what it’s going to become, alright, well, part of filling up the blanks in the inventory is about, alright, what’s the new job coming up?

