NATO Tests A Post-Quantum VPN

Scientists are predicting that quantum computers will soon be able to break some commonly used encryption methods and it transpires that NATO and allies have been testing post-quantum solutions to prepare for possible future attacks. 

Post-Quantum provides different algorithms to ensure security, even when facing attackers using quantum computing. 

A Virtual Private Network (VPN) can use these algorithms to secure communications, ensuring that only the correct recipient can read the data. 

The British National Cyber Security Centre (NCSC) has performed successful tests of communication flows secured for a post-quantum world, using a VPN designed and built by Post-Quantum, a UK-based quantum cyber specialist. The NCSC stated that it is becoming increasingly important to stay alert of current and projected threats, prompting the tests. 

The trial began in March 2021, and was recently completed as quantum computing is becoming more practical and affordable. This means that attackers may begin adopting the technology to advance their attacks. It is thought that a quantum computer will soon be able to break most, if not all, current encryption methods leaving email, secure banking and communications systems vulnerable to disruption from malicious actors. 

This means all large organisations, technology companies and Internet standards will need to transition to quantum-secure encryption.

The NCSC has responsibility for protecting NATO networks as part of a project was financed by the Allied Command Transformation’s VISTA framework.  which is tasked with leveraging knowledge and research done by NATO enterprise, nations, academia and industry to “enable science and technology for accelerated warfare development”. The NCSC worked with a UK-based company Post-Quantum to conduct the test. The company provides organisations with algorithms that ensure security even if attackers are leveraging quantum computing and according to Post-Quantum, its technology blends both post-quantum and traditional encryption algorithms to ensure that data transiting the VPN can only be read by the intended recipient. 

Post-Quantum uses VPN algorithms to secure communications and make sure that only the correct recipient can read the data.

“Securing NATO’s communications for the quantum era is paramount to our ability to operate effectively without fear of interception... With the threat of ‘harvest now and decrypt later’ looming over secure communications, this is an increasingly important effort to protect against current and future threats.” said Konrad Wrona, principal scientist at the NATO Communications & Information Agency (NCIA). 

It will take several years for systems to migrate to quantum-secure technology and right now it appears more realistic to combine cutting-edge algorithms with more traditional encryption to ensure interoperability into the future.

The technology has already been proposed to the Internet Engineering Taskforce (IETF) for open standardisation.

Post-Quantum has developed a suite of quantum-safe software products with a focus on identity, transmission and encryption, delivering end-to-end quantum-secure environments. “Over 10 years of deep R&D means we are well placed to engineer real-world quantum-safe solutions,” said Andersen Cheng, CEO of Post-Quantum. “This project with NATO is an important milestone in the world’s migration to a quantum-safe ecosystem. Organisations would be wise to take action now.”

NCIA:     NCIA:     Computer Weekly:      Oodaloop:     Post-Quantum:     Information Age:     ZDNet:     

You Might Also Read: 

Quantum Computing Will Have A Revolutionary Effect:

 

« Russia Threatens To Block Wikipedia
Microsoft Exchange Exploited By ‘Cuba’ »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

Aristi Labs

Aristi Labs

Aristi Labs provides comprehensive security solutions to help businesses protect data and intellectual property, minimizing downtime and maximizing productivity.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

Redington

Redington

Redington offer products and services in solution areas including digital transformation, hybrid infrastructure and cybersecurity.

MLSecOps Community

MLSecOps Community

The MLSecOps Community is a collaborative space for machine learning security experts and industry leaders to connect and shape the future of AI/ML security.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.