Skip to main content
banner image
venafi logo

Preparing for The Crypto-Apocalypse: Three Steps to Take Now

Preparing for The Crypto-Apocalypse: Three Steps to Take Now

quantum computing and encryption
October 3, 2017 | Eva Hanscom

In mid-September, David Oberhaus, cyber security reporter for Vice Motherboard and CNET, posed an interesting question: how can encryption survive in the age of quantum computing? Even the most complex and powerful computers in existence today pale when compared to quantum devices.

And while this technology can be a boon for scientific and societal advancement, we still don’t quite understand how it will impact information security.

“The threat of a crypto-apocalypse, where everyone's private information becomes insecure due to the arrival of large-scale quantum computers, is no longer a question of 'if,' but a question of 'when,” writes Oberhaus. “The perceived inevitability has security researchers locked in a high-stakes race to develop quantum-resistant cryptography before the dawn of the first large-scale quantum computer arrives on the scene.”

Many industry leaders have been anticipating this issue for years. “Since 2015, we have identified a mass failure in cryptography as the most alarming threat to machine identities, privacy and trust,” says Kevin Bocek, chief security strategist for Venafi. “Now, we are recognizing that the day of a crypto-apocalypse is drawing closer and closer. Every digital asset that makes modern life possible, from online payments to global stock trading, relies on modern cryptographic methods. A crypto-apocalypse event could lead to recessions in multiple economies and much worse.”

So how can cyber security experts ward off this upcoming crypto-apocalypse? Is it possible to embrace quantum computing without hindering encryption?

“Unfortunately, the algorithms needed to generate quantum-immune machine identities are not available at this point in time,” continues Bocek. “But, there are steps organizations can take today to prepare themselves.”

Bocek recommends organizations follow NIST’s certificate guidance and take the following steps:

  1. Understand which machine identities are in use, where they are and what crypto they utilize.
  2. Have the ability to control and automate the change out of their machine identities using today’s crypto.
  3. Begin practicing responding to large scale change outs.

The crypto-apocalypse may be on the horizon, but there is no excuse to be caught off guard. With proper protection and practice, quantum computing and encryption can exist side-by-side.

Are you prepared for the crypto-apocalypse?

Like this blog? We think you will love this.
graphic of a spinning atom against a dark background
Featured Blog

What is the Impact of Google’s Quantum Supremacy on Cryptography?

Is that all

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

CIO Study: Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

Forrester Consulting Whitepaper: Securing the Enterprise with Machine Identity Protection
Industry Research

Forrester Consulting Whitepaper: Securing the Enterprise with Machine Identity Protection

Machine Identity Protection for Dummies
eBook

Machine Identity Protection for Dummies

About the author

Eva Hanscom
Eva Hanscom

Eva is Public Relations Manager at Venafi. She is passionate about educating the global marketplace about infosec and machine-identity issues, and in 2018 grew Venafi's global coverage by 45%.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat