pds-it
['Blog post','no']
Service and project management
Blog

BSI evaluates technologies for quantum-safe encryption

Contents

    According to a technical position paper, quantum computers should be able to crack current encryption mechanisms as early as the 2030s. The Federal Office for Information Security (BSI) therefore emphasizes the urgency of switching to quantum-safe encryption technologies today.

    Experts recommend post-quantum cryptography

    Two solutions are currently being discussed by European security authorities: post-quantum cryptography (PQK) and quantum key distribution (QKD).

    PQC is a software-based solution that relies on the development of new algorithms and offers broad application possibilities, while QKD is a hardware-based method that utilizes the immutable properties of photons to ensure theoretically unbreakable security, but comes with higher costs and infrastructure requirements.

    Post-quantum cryptography uses algorithms based on mathematical problems that are difficult to solve even by quantum computers. PQC can use the same hardware infrastructure as today's digital networks and is compatible with any form of digital communication, including electrical wires, radio waves and optical networks.

    Quantum key distribution (QKD), on the other hand, uses the principles of quantum mechanics to enable secure communication by using photons to transmit keys. This is designed to detect any form of eavesdropping immediately, as any measurement of the photons would change their state, marking the communication as compromised. QKD theoretically offers complete security, but it comes at a high cost and requires a special hardware infrastructure.

    experts assume that the first standards developed in a process organized by the US National Institute of Standards and Technology (NIST) will be published this year.

    Recommendations for companies

    To meet the growing demands of data privacy and emerging quantum technology, IT professionals should consider the following:

    1. assess current security measures: Organizations should review their existing data privacy and security protocols and identify areas that need improvement in light of future quantum computing threats.

    2. partnership with trustworthy providers: The choice should fall on IT service providers who demonstrably adhere to strict data protection standards.

    3. investment in quantum-safe technologies: The introduction of post-quantum cryptography and other quantum-safe solutions will enable companies to arm themselves against future threats in good time and ensure the long-term security of their data.

    Learn data privacy and security with Skill IT

    With our training courses, we support you in meeting all challenges in the area of data privacy and IT security and IT security. We teach you about the latest trends and technologies in data privacy, including post-quantum cryptography, helping you to protect data and prepare for the future.

    Author
    Stefanie Ruth Heyduck
    Stefanie Ruth Heyduck is a journalist and communications consultant with over 20 years of experience. As a nerd by nature, her focus is on science and technology topics.