Page 11 - 23_EETE_03
P. 11
EE|Times EUROPE 11
EMBEDDED WORLD 2023: SECURITY FOCUS
Post-Quantum Cryptography: Are You Ready?
By Robert Huntley
he Quantum Computing Cybersecurity Preparedness Act was signed attacks. “There’s no question that for really
into U.S. law on Dec. 22, 2022, marking a crucial step in U.S. cyber- critical information, adversaries are capturing
security legislation that commenced in 2016. Back then, the U.S. it. If they can decrypt it a decade from now,
T National Institute of Standards and Technology (NIST) issued a call that could be extremely damaging. In the
U.S., for example, the U.S. National Security
for proposals of post-quantum cryptographic algorithms that could resist Agency has recommended all digital signing
attempts by quantum computers to compromise them. Now, eight years and be updated to quantum-safe by 2025, so we’ve
four selection rounds later, NIST has announced its choice of quantum- got pressure from government regulations to
adopt it more quickly.”
resistant algorithms for public key encryption (CRYSTALS-KYBER) and digital Shahram Mossayebi, co-founder and CEO
signatures (CRYSTALS-DILITHIUM and SPHINCS+). The finalized standards will of Crypto Quantique, told EE Times Europe
that the science of cryptographic standards
be published in 2024, but that doesn’t mean the semiconductor industry and its is built on complex mathematical problems
customers should wait until then. that cannot be solved efficiently and within
a reasonable time. How-
The threat that quantum computers pose a worldwide standard,” said ever, “while we build and
to classical security methods like RSA and Joppe Bos, senior princi- use these cryptographic
ECC has been growing steadily. It is widely pal cryptographer at NXP algorithms, it never rules
recognized that once commercially available Semiconductors’ Competence out that someone, at some
quantum computers have sufficient com- Center for Cryptography and point, might come up with
putation resources, current “hard problem” Security in Belgium and a a genius idea and be able to
asymmetrical cryptographic techniques member of the NIST-selected break the algorithm,” he said.
will not be adequate. There is no precise CRYSTALS-KYBER algorithm “So whether we worry about
estimate of when large-scale quantum com- team. “However, we already quantum computers or not,
puters will become a reality. However, most see in Europe that certain from a cryptography point
experts suggest it is within the next decade government agencies—for of view, there is an element
and advise that whenever it might happen, example, Germany’s Federal that breaking the algorithm
being prepared is the best policy. National Office for Information is always possible.”
cybersecurity organizations across Europe Security [BSI] and the For most commercial orga-
are already publishing frameworks and National PQShield’s Alan Grau nizations, there is no hard
checklists for companies and government Cybersecurity Agency of and fast timeline to follow.
agencies, with an emphasis on reviewing France [ANSSI]—are saying they will support That said, the need to continually evaluate
and equipping their security infrastructures the selected schemes but might extend the the risks from any adversaries, whether
ahead of time. list to standardized algorithms by certain quantum-based or not, is omnipresent,
other algorithms.” something the embedded community has
NIST ALGORITHMS BECOME GLOBAL adopted since disparate systems connected
STANDARDS THE COUNTDOWN TO QUANTUM- to the internet. Regulatory compliance
Although NIST is setting the U.S. policy on RESISTANT COMPUTING against national, regional and market-specific
quantum-safe computing, its actions are Many in security have set the end of this security standards will significantly influence
of worldwide concern. Global adoption of decade as the notional timeline for imple- the timeline that is right for your company.
cybersecurity standards is menting post-quantum Mossayebi cited the ETSI Quantum-Safe
crucial for interoperability, cryptography (PQC). “It takes Cryptography specifications and the EU’s
with other regions of the a long time to roll [PQC] Cybersecurity and Cyber Resilience Acts as
world following the U.S., through infrastructure,” said factors that will heavily drive customer adop-
just as we have done for RSA Alan Grau, sales and market- tion of post-quantum security.
and ECC. That’s not to say ing director of PQShield. “In
Europe hasn’t been involved the telecom world, for exam- CHALLENGES FOR THE SEMICONDUCTOR
in the submission process. ple, the scope of the problem, INDUSTRY
Most submissions are from from end-to-end consumer Microcontroller (MCU), SoC and other
global teams, with European devices, the infrastructure, processor vendors face many challenges
cryptographic experts well public key systems and hard- incorporating quantum-resistant cryp-
represented. But will ware security modules—it’s tographic functions inside their products.
European countries continue a massive undertaking to Thankfully, and perhaps most importantly,
to adopt the NIST selections, update all that. It will take a the market leaders tasked their engineering
or might there be decade or more.” teams to investigate the potential problems
country-specific differences? Grau also noted the well ahead of any selected algorithms and to
“Everybody will follow this NXP Semiconductors’ concerns over harvesting anticipate customer requirements.
[NIST] standard, so it will be Joppe Bos now and decrypting later The longer key and signature lengths and
www.eetimes.eu | MARCH 2023

