Trade Law Daily is a Warren News publication.

Ericsson: Companies Should Prepare for Post-Quantum Encryption

Communication companies should prepare now for the threat from quantum computing, which can break the cryptography that protects data from attacks, Taylor Hartley, network security solutions architect at Ericsson North America, said during an IEEE webinar Wednesday. “Anything that utilizes…

Sign up for a free preview to unlock the rest of this article

Timely, relevant coverage of court proceedings and agency rulings involving tariffs, classification, valuation, origin and antidumping and countervailing duties. Each day, Trade Law Daily subscribers receive a daily headline email, in-depth PDF edition and access to all relevant documents via our trade law source document library and website.

a public key can easily be broken by a quantum computer,” Hartley said. “We definitely have reason to believe” bad actors are gathering encrypted data so that they will be able to unencrypt it one day, she said. Hartley recommended migrating weakened algorithms to post-quantum cryptograpy. The National Institute of Standards and Technology ran a contest and selected the first three algorithms found to be quantum resistant, she said. It's expected the three will be standardized this summer and “then we can start implementing them,” Hartley said. The concept of quantum computing started in the 1980s, and we’ve known since the 1990s that it could “break the cryptography that we use today,” she said. The first commercially available quantum computer was introduced in 2011, she said. Recently, companies like IBM, Google and Honeywell have made advances in quantum computing, she said. Hartley recommended starting a "quantum readiness road map, conducting inventories, applying risk assessments and analysis and engaging with your vendors.”