Skip to main content
banner image
venafi logo

Preparing for The Crypto-Apocalypse: Three Steps to Take Now

Preparing for The Crypto-Apocalypse: Three Steps to Take Now

quantum computing and encryption
October 3, 2017 | Emil Hanscom

In mid-September, David Oberhaus, cyber security reporter for Vice Motherboard and CNET, posed an interesting question: how can encryption survive in the age of quantum computing? Even the most complex and powerful computers in existence today pale when compared to quantum devices.

And while this technology can be a boon for scientific and societal advancement, we still don’t quite understand how it will impact information security.

“The threat of a crypto-apocalypse, where everyone's private information becomes insecure due to the arrival of large-scale quantum computers, is no longer a question of 'if,' but a question of 'when,” writes Oberhaus. “The perceived inevitability has security researchers locked in a high-stakes race to develop quantum-resistant cryptography before the dawn of the first large-scale quantum computer arrives on the scene.”

Many industry leaders have been anticipating this issue for years. “Since 2015, we have identified a mass failure in cryptography as the most alarming threat to machine identities, privacy and trust,” says Kevin Bocek, chief security strategist for Venafi. “Now, we are recognizing that the day of a crypto-apocalypse is drawing closer and closer. Every digital asset that makes modern life possible, from online payments to global stock trading, relies on modern cryptographic methods. A crypto-apocalypse event could lead to recessions in multiple economies and much worse.”

So how can cyber security experts ward off this upcoming crypto-apocalypse? Is it possible to embrace quantum computing without hindering encryption?

“Unfortunately, the algorithms needed to generate quantum-immune machine identities are not available at this point in time,” continues Bocek. “But, there are steps organizations can take today to prepare themselves.”

Bocek recommends organizations follow NIST’s certificate guidance and take the following steps:

  1. Understand which machine identities are in use, where they are and what crypto they utilize.
  2. Have the ability to control and automate the change out of their machine identities using today’s crypto.
  3. Begin practicing responding to large scale change outs.

The crypto-apocalypse may be on the horizon, but there is no excuse to be caught off guard. With proper protection and practice, quantum computing and encryption can exist side-by-side.

Are you prepared for the crypto-apocalypse? 

Like this blog? We think you will love this.
quantum-computing
Featured Blog

ISARA Paves Path to Quantum-Safe Security with Dedication of Hybrid Certificate Patents

One of the initial challen

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

Subscribe Now

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies
eBook

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Emil Hanscom
Emil Hanscom

Emil is the Public Relations Manager at Venafi. Passionate about educating the global marketplace about infosec and machine-identity issues, they have consistently grown Venafi's global news coverage year over year.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more