CyberSecurity Magazine Newsletter: August 2022

 

Dear Reader,

 

In this month’s newsletter, we examine a somewhat futuristic topic that has been making waves in the security community for a few years already. Quantum computing (QC), or more precisely, the threats it poses to public-key crypto systems are looming on the horizon. Until now, no sufficiently powerful quantum computer exists that could break today’s standard algorithms in a reasonable amount of time. Once they are here, though, the impact to our digital infrastructure will be severe. The question is: When is the right time to transition to post-quantum cryptography (PQC)?

 

Start preparing for the migration, says CISA

In a recent publication, CISA warns about the potential risk of QC to critical infrastructure. The agency describes how QC threatens the United States’ National Critical Functions (NCF), and outlines what is necessary for them to transition to PQC. The paper also contains a list of helpful PQC resources by CISA and other organizations.

 

QC impact on communications networks

In a whitepaper titled Preparing Communications Networks for the Quantum Future, ATIS discusses QC threats and opportunities, specifically for the internet and cellular communications infrastructure. Both of these domains will be impacted, given that public-key cryptography is an essential part of almost any modern computer network. However, work has already started to transition these complex, interconnected systems to PQC.

 

Determining the new PQC standards

NIST has been assessing PQC algorithm candidates for a number of years and the security community has been eagerly awaiting their recommendations. Then in July, NIST announced the initial four PQC algorithms supposed to form part of its upcoming standard. Specifically, one encryption algorithm and three algorithms for digital signatures.

 

PQC is not bullet proof

Beyond the initial four, NIST had also announced they planned to include four additional algorithms. Among them, an encryption algorithm called SIKE. That is, until researchers from KU Leuven published a paper describing an attack that allows to to recover the encryption keys and break the cipher. Even worse, it took the researchers merely an hour to do so – on a traditional PC! 

 

Catch up with the latest trends in PQC and beyond

If you have visited the Cybersecurity Magazine website recently, you may have noticed that we partnered up with ETSI as an official media partner of the 2022 ETSI Security Conference. Held from Oct 3-5 in Sophia Antipolis, it is one of the most important European security events, bringing together recognized security experts from around the world. Aside from PQC, the agenda contains talks and panels on topics such as 5G, AI, the European Cyber Security Act, IoT and Connected Device Security, and Co-ordinated Vulnerability Disclosure (CVD). Learn more about the event and how to register on the ETSI website.

 

 

Cybersecurity Magazine Editorial Team

 

----------------

International Cyber Expo is where great cybersecurity minds come together to explore the issues of tomorrow's interconnected world.

Held at Olympia London on the 27th - 28th September 2022, International Cyber Expo endeavours to be the go-to meeting place for industry collaboration, where everyone from vetted senior cybersecurity buyers, government officials and entrepreneurs, to software developers and venture capitalists, are welcome to share their experiences, knowledge and resources with peers. Equally, the Expo will focus on connecting cybersecurity vendors with decision-makers such as CISOs, CIOs, and Head of Information Security from mid-large sized enterprises, government, critical national infrastructure, and public sector organisations. 

As one of the must attend annual cybersecurity expos, the inclusive event is made for the community, by the community, hosts a world-class Global Cyber Summit, an exhibition space, live immersive demonstrations and informal networking in partnership with Beer Farmers.

 

 -----------------

 

For our latest video discussion on the security and production systems please see the River Publishers YouTube.

The latest journal articles from River Publishers in all areas of cyber security can be found on the River Publishers website.

    https://cybersecurity-magazine.com/

    https://www.linkedin.com/showcase/cybersecuritymagazine

    @magcybersec

    https://www.facebook.com/Cybersecurity-Magazine-100535232117942