Podcast
Root Causes 251: What's Next for the NIST PQC Primitives?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
October 28, 2022
NIST has announced its new post-quantum cryptography primitives. So now what? In this episode we discuss the next steps required by the technology industry for widespread adoption of these algorithms and what the enterprise can do starting today to ready itself for quantum-safe encryption.
Podcast Transcript
Lightly edited for flow and brevity.
And isn't that interesting? Because what happens if one day, two, three, four years from now, it turns out that it isn't even quantum computers we have to worry about. It's some new form of math that has some sort of quadratic sieve, some genius has come up with that somehow now, you're able to guess prime numbers that nobody ever thought possible. And RSA is just beaten. The factorization of RSA just becomes trivial and everybody big rush has to go to ECC. Well, guess what? This is what hybrid certificates can give you. And so, yes, it's usually talked about in the post- quantum sense, but it's useful for any form of algorithm and that's why when we're talking about, hey, why can Cloudflare afford to be using a draft standard before the final standardization? Well, it’s because the hybrid certs. That's the reason.
One is one has been called out. It's number one on the list of whether it's the Department of Homeland Security all the way to other things that we've done other forms of guidance that we've called out. Number one is taking inventory of all the places that you're using PKI. Where are you using ECC algorithm? Where are you using RSA algorithm? It's just I guarantee it's very prevalent within your organization but don't feel overwhelmed by it. Narrow it down. Like in other words, don't worry about systems so much that are using AES encryption. You might see references to AES encryption all over your enterprise. If you see that, that's fantastic. Note it down. But where you really want to focus here in your inventory taking is anywhere you're using RSA or ECC for the purposes of not necessarily just an encryption, we're talking about use cases such as SSL. Even though that term has been deprecated to TLS, most of you guys know it as SSL. In other words, where are your web servers? That's the first question because those systems will be affected by this. And the second major category of systems is going to be anywhere that you're doing authentication. In other words, anywhere you are using PKI for authentication is going to be affected by this. And the third area is anywhere where you're doing signing. You're probably not generating code signing certificates, but you may be in the possession of PKI certificates for the purposes of document signing, for example. And so therefore, that's the third major area that I think concentrate on those. The first major area is just good old-fashioned AES encryption. That's really not as affected by this. But those other three categories, those are the ones where you want to get your inventory list really, really tight.
While you're doing that, I think an exercise in parallel is for those enterprises - and there's a lot of you out there - who are running things like MSCA. Good old-fashioned Microsoft CA, Active Directory Certificate Services for those of you know it as that. So those of you who are running CAs from other CA vendors, for private PKI purposes. That's absolutely, absolutely core in your inventory and because those are used for many of those use cases that we just talked about. The thing is, the thing is, you may want to experiment with what does a native post-quantum CA look like? That's available. And in fact, the usage of hybrid certificates is something that you can now get your hands dirty with and the beauty of it is if you have staff that are already running those kinds of PKI resources in your enterprise, they have more than enough capability to get their hands dirty with the new stuff and start learning what a hybrid cert looks like, the length of time it takes to actually issue one. Play around. Because of the fact that you can swap between post-quantum cryptographic algorithms, do that. Have a look at what each of them do. Become opinionated about Kyber and some of the others that are available to you. I would challenge any enterprise - you're good at this when you can make informed statements about we've chosen Kyber over the other NIST, you know, NIST choices because of x, y, or z. If you can repeat that back to me, you guys get an A+, because you're exactly where you need to be at this point in the game, with what Tim just said about where the rest of the industry, what it's doing, and what you'll ultimately have to respond to, once we're there.
In the case of SaaS, I think that's mostly going to be handled for you. So you’re using a SaaS service, it's pretty much that vendor’s problem, except for kind of an unusual circumstance, it's that vendor’s problem to get that cryptography upgraded but you're still the one who is vulnerable. So understanding what their plans are, and their timelines are and whether again, whether you're happy with those plans and timelines is also something that the enterprise can be working on now. And then there are going to be some legacy systems, or there's going to be some hardware that may be extremely inflexible and under those circumstances, you're going to have to make a decision. You're going to decide, are these things that I'm willing to take my chances with? Maybe because it's not that essential what they do, maybe there's no real secrets there? Maybe if it got knocked down, we could weather it? Or are these core? Are these very essential? And once again there, do I need to think about an upgrade? Do I need to think about changing out that hardware? Or do I think I need think about changing out that legacy homegrown baseline system that things are built on that just isn't safe anymore? And so that's another way I think to think about this as an enterprise, is you look at what are the sources of technology that I have and what are those sources going to do to allow me to be quantum safe and when.
I think it's fantastic that your content delivery network, you don't have to worry about it too much. It's just there. Your inventory sheet is just a checkmark, saying my understanding is that my content delivery network is already using post-quantum algorithms. Fantastic. But for those of you who say don't have your PKI hosted in the cloud, a lot of you who are running it in-house, what are you going to do with that? And maybe the decision is maybe I look at dealing with a vendor who's taking care of this for me.
So the new NIST algorithms are out and we see there's a lot of work to be done but I hope part of the takeaway here is that there are things that you can do starting now and then the rest of the industry will work through its work and we'll all be able to move over to these algorithms.

