Skip to main content
banner image
venafi logo

Preparing for The Crypto-Apocalypse: Three Steps to Take Now

Preparing for The Crypto-Apocalypse: Three Steps to Take Now

quantum computing and encryption
October 3, 2017 | Eva Hanscom

In mid-September, David Oberhaus, cyber security reporter for Vice Motherboard and CNET, posed an interesting question: how can encryption survive in the age of quantum computing? Even the most complex and powerful computers in existence today pale when compared to quantum devices.

And while this technology can be a boon for scientific and societal advancement, we still don’t quite understand how it will impact information security.

“The threat of a crypto-apocalypse, where everyone's private information becomes insecure due to the arrival of large-scale quantum computers, is no longer a question of 'if,' but a question of 'when,” writes Oberhaus. “The perceived inevitability has security researchers locked in a high-stakes race to develop quantum-resistant cryptography before the dawn of the first large-scale quantum computer arrives on the scene.”

Many industry leaders have been anticipating this issue for years. “Since 2015, we have identified a mass failure in cryptography as the most alarming threat to machine identities, privacy and trust,” says Kevin Bocek, chief security strategist for Venafi. “Now, we are recognizing that the day of a crypto-apocalypse is drawing closer and closer. Every digital asset that makes modern life possible, from online payments to global stock trading, relies on modern cryptographic methods. A crypto-apocalypse event could lead to recessions in multiple economies and much worse.”

So how can cyber security experts ward off this upcoming crypto-apocalypse? Is it possible to embrace quantum computing without hindering encryption?

“Unfortunately, the algorithms needed to generate quantum-immune machine identities are not available at this point in time,” continues Bocek. “But, there are steps organizations can take today to prepare themselves.”

Bocek recommends organizations follow NIST’s certificate guidance and take the following steps:

  1. Understand which machine identities are in use, where they are and what crypto they utilize.
  2. Have the ability to control and automate the change out of their machine identities using today’s crypto.
  3. Begin practicing responding to large scale change outs.

The crypto-apocalypse may be on the horizon, but there is no excuse to be caught off guard. With proper protection and practice, quantum computing and encryption can exist side-by-side.

Are you prepared for the crypto-apocalypse?

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

man sitting on chair and thinking

Venafi Study: Are Financial Service Organizations More Likely to Suffer Certificate-Related Outages?

accessec, APIIDA, Crypto4A, Difenda

Six Groundbreaking Machine Identity Protection Developers Gain Funding

code signing certificates, Code Signing, Stuxnet, ShadowHammer

Study: How Well Are You Protecting Code Signing Certificates?

About the author

Eva Hanscom
Eva Hanscom

Eva Hanscom writes for Venafi's blog and is an expert in machine identity protection.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat