Page 1 - GS220801
P. 1

August 8, 2022  •  Issue 22:08:01

                      Editing Paytech DNA – Part 2





                                                               Therefore, regardless of whether we can estimate the exact
                                                               time of the arrival of the quantum computing era, we must
                                                               begin now to prepare our information security systems to
                                                               be able to resist quantum computing."
                                                               Cracking PKI

                                                               Andrew Deignan, global vice president of marketing at
                                                               MagTek,  agreed quantum computing threatens public
                                                               key infrastructure (PKI), which uses public and private
                                                               asymmetric keys. "PKI begins with two asymmetric keys,
                                                               where one is private and the other is public," he said. "The
                                                               public key can be easily shared with the world, almost like
                                                               a telephone directory. The private key is kept secret by
                                                               its owner; [both keys] are large prime numbers that work
                                                               together with factoring."


        By Dale S. Laszig                                      Deignan went on to say factoring large prime numbers is
                                                               difficult for today's PCs,  but a quantum  computer could
                 verything about digital commerce is evolution-  rip through millions of possibilities in minutes. This
                 ary, down to its most fundamental binary code.   technology, when available, will make data or keys that
                 This series delves into the frameworks and build-  use PKI encryption schemes vulnerable, he said, because
        E ing  blocks  of payment technologies that adapt      it would enable hackers who know a public key to quickly
        and even mutate in response to emerging opportunities   determine a private key and decrypt files, and secret
        and threats. Part 1 explored algorithms and cryptographic   keys exchanged by the PKI method would also become
        key infrastructures. Part 2 will look at how innovative secu-  untrustable.
        rity experts are editing these technologies to create a new
        generation of post-quantum cryptography (PQC).         Deignan called NIST's prediction of large-scale PKI attacks
                                                               a very real, spine-chilling threat to all the data and keys we
        Quantum computers calculate  at dizzying speeds,       think of as protected today that could be exposed tomorrow.
        raising concerns among security professionals about the   "Hackers are stealing encrypted data now but they are not
        impenetrability of existing algorithms and cryptographic   trying to decrypt it now," he said.  "They are waiting for
        key infrastructures. The National Institute of Standards   quantum computers to become available so they can expose
        and Technology does not view quantum computing         the data later. 'Steal now, decrypt later' is an immediate
        attacks as a near-term threat but is nevertheless reviewing   threat, especially for, but not limited to, massive amounts
        proposals it requested for standardizing quantum-resistant
        algorithms. NIST disclosed fourth round finalists on July 5,
        2022, setting an Oct. 1, 2022 deadline for modifications to
        those submissions.                                       Contributed articles inside by:

        "Some engineers [predict] that within the next twenty or   Natasa Cvijanovic .................................................................................28
        so years sufficiently large quantum computers will be
        built to break essentially all public key schemes currently   Chirag Patel ............................................................................................32
        in use," NIST wrote. "Historically, it has taken almost two   Elie Y. Katz ...............................................................................................34
        decades to deploy our modern public key cryptography
        infrastructure.
                                                                                      Continued on page 26
   1   2   3   4   5   6