In an interconnected world, we take for granted the security and encryption of communications protocols, at home, at work, and in vehicles. While technology has been heavily invested in to keep protocols like TCP/IP secure, it will be necessary to upgrade the cryptographic standard upon which they are based.
This is the basis of the DesignCon keynote, “Post-Quantum Cryptography: The Next Decade of Cryptographic Hardware Design”, scheduled for Tuesday, January 31, from 11:45 AM to 12:30 PM. Aydin Aysu, assistant professor and head of the Hardware Cybersecurity Research Lab at North Carolina University, is the keynote speaker. She believes quantum computers are capable of breaking existing cryptography algorithms that can sometimes be traced back 40 years. Aysu spoke to Design News in an interview, saying that “we have mathematical evidence” it could occur.
Aysu explained that this problem could be most serious in military and government systems. A breach of cryptographic encryption would expose sensitive records to theft.
NIST Leading Efforts
Aysu also noted that NIST (National Institute of Standards and Technology) actively seeks to make cryptographic infrastructure more modern. NIST is currently evaluating quantum cryptographic algorithms for secure computing, both from academia and industry. They are in the process of being standardized, with the aim of completing them within a few years.
Aysu will discuss the new computational units that will drive future standards. He will share the team’s efforts to build secure, efficient cryptographic solutions for future protocols.
Not surprising, the vast network of cryptographic protocols that will need to be updated is likely to slow down the implementation of post-quantum encryption. It’s a challenge to introduce new cryptography and not compromise the integrity of the cryptographic structure. Aysu stated, “We will probably need to encrypt with both new and old algorithms as part of our transition.”
Aysu pointed out that changes in hardware and software will be necessary to improve cryptography standards. “Hardware encryption may be required for highly-secure or high performance applications. Software could be used for others.”
The existing talent pool that can handle the tasks of upgrading the cryptographic network infrastructure will likely be in high demand. Aysu’s North Carolina University is a school that teaches cryptography and cybersecurity. But these courses are now being offered elsewhere. Aysu believes government support might be necessary to fund additional programs to train future scientists.