NATO Tests A Post-Quantum VPN

Scientists are predicting that quantum computers will soon be able to break some commonly used encryption methods and it transpires that NATO and allies have been testing post-quantum solutions to prepare for possible future attacks. 

Post-Quantum provides different algorithms to ensure security, even when facing attackers using quantum computing. 

A Virtual Private Network (VPN) can use these algorithms to secure communications, ensuring that only the correct recipient can read the data. 

The British National Cyber Security Centre (NCSC) has performed successful tests of communication flows secured for a post-quantum world, using a VPN designed and built by Post-Quantum, a UK-based quantum cyber specialist. The NCSC stated that it is becoming increasingly important to stay alert of current and projected threats, prompting the tests. 

The trial began in March 2021, and was recently completed as quantum computing is becoming more practical and affordable. This means that attackers may begin adopting the technology to advance their attacks. It is thought that a quantum computer will soon be able to break most, if not all, current encryption methods leaving email, secure banking and communications systems vulnerable to disruption from malicious actors. 

This means all large organisations, technology companies and Internet standards will need to transition to quantum-secure encryption.

The NCSC has responsibility for protecting NATO networks as part of a project was financed by the Allied Command Transformation’s VISTA framework.  which is tasked with leveraging knowledge and research done by NATO enterprise, nations, academia and industry to “enable science and technology for accelerated warfare development”. The NCSC worked with a UK-based company Post-Quantum to conduct the test. The company provides organisations with algorithms that ensure security even if attackers are leveraging quantum computing and according to Post-Quantum, its technology blends both post-quantum and traditional encryption algorithms to ensure that data transiting the VPN can only be read by the intended recipient. 

Post-Quantum uses VPN algorithms to secure communications and make sure that only the correct recipient can read the data.

“Securing NATO’s communications for the quantum era is paramount to our ability to operate effectively without fear of interception... With the threat of ‘harvest now and decrypt later’ looming over secure communications, this is an increasingly important effort to protect against current and future threats.” said Konrad Wrona, principal scientist at the NATO Communications & Information Agency (NCIA). 

It will take several years for systems to migrate to quantum-secure technology and right now it appears more realistic to combine cutting-edge algorithms with more traditional encryption to ensure interoperability into the future.

The technology has already been proposed to the Internet Engineering Taskforce (IETF) for open standardisation.

Post-Quantum has developed a suite of quantum-safe software products with a focus on identity, transmission and encryption, delivering end-to-end quantum-secure environments. “Over 10 years of deep R&D means we are well placed to engineer real-world quantum-safe solutions,” said Andersen Cheng, CEO of Post-Quantum. “This project with NATO is an important milestone in the world’s migration to a quantum-safe ecosystem. Organisations would be wise to take action now.”

NCIA:     NCIA:     Computer Weekly:      Oodaloop:     Post-Quantum:     Information Age:     ZDNet:     

You Might Also Read: 

Quantum Computing Will Have A Revolutionary Effect:

 

« Russia Threatens To Block Wikipedia
Microsoft Exchange Exploited By ‘Cuba’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

Open Source Security Foundation (OpenSSF)

Open Source Security Foundation (OpenSSF)

OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.