The DHS states in its memo, “While the exact timeline of a quantum computer capable of executing advanced algorithms putting DHS cryptographic equipment inventory at risk is uncertain, the significance of the risk is not.”¹¹ Threat actors are also aware of the rapid pace of quantum computing and are looking ahead at the opportunities to exploit future vulnerabilities. These threat actors are currently exercising crypto harvesting techniques, where they are applying a “harvest now, decrypt later” approach to data theft. For many years, encryption has been the answer to the data loss challenge, but the application of Shor’s algorithm with a quantum computer is causing traditional encryption techniques to soon become obsolete and is driving an aggressive response.
The federal government is taking this risk very seriously and is advocating for a swift, proactive approach to mitigating the risk
The DHS is expecting federal agencies to complete their preparations for post-quantum protections prior to the NIST’s updated cryptographic guidelines, which are expected to be released in 2024. Additionally, President Biden issued a national security memorandum in January 2022 giving only 180 days for government agencies to “identify any instances of encryption not in compliance with NSA-approved Quantum Resistant Algorithms.”¹² And for those instances, they must create both an exception and a timeline for their remediation. The aggressive timelines set forth by the government are dramatically different from any timing we have seen in past migrations (e.g., SHA1 to SHA2). The DHS memo specifically states, “A slow transition could prove costly in terms of security.”¹³