NATO Tests A Post-Quantum VPN

Scientists are predicting that quantum computers will soon be able to break some commonly used encryption methods and it transpires that NATO and allies have been testing post-quantum solutions to prepare for possible future attacks. 

Post-Quantum provides different algorithms to ensure security, even when facing attackers using quantum computing. 

A Virtual Private Network (VPN) can use these algorithms to secure communications, ensuring that only the correct recipient can read the data. 

The British National Cyber Security Centre (NCSC) has performed successful tests of communication flows secured for a post-quantum world, using a VPN designed and built by Post-Quantum, a UK-based quantum cyber specialist. The NCSC stated that it is becoming increasingly important to stay alert of current and projected threats, prompting the tests. 

The trial began in March 2021, and was recently completed as quantum computing is becoming more practical and affordable. This means that attackers may begin adopting the technology to advance their attacks. It is thought that a quantum computer will soon be able to break most, if not all, current encryption methods leaving email, secure banking and communications systems vulnerable to disruption from malicious actors. 

This means all large organisations, technology companies and Internet standards will need to transition to quantum-secure encryption.

The NCSC has responsibility for protecting NATO networks as part of a project was financed by the Allied Command Transformation’s VISTA framework.  which is tasked with leveraging knowledge and research done by NATO enterprise, nations, academia and industry to “enable science and technology for accelerated warfare development”. The NCSC worked with a UK-based company Post-Quantum to conduct the test. The company provides organisations with algorithms that ensure security even if attackers are leveraging quantum computing and according to Post-Quantum, its technology blends both post-quantum and traditional encryption algorithms to ensure that data transiting the VPN can only be read by the intended recipient. 

Post-Quantum uses VPN algorithms to secure communications and make sure that only the correct recipient can read the data.

“Securing NATO’s communications for the quantum era is paramount to our ability to operate effectively without fear of interception... With the threat of ‘harvest now and decrypt later’ looming over secure communications, this is an increasingly important effort to protect against current and future threats.” said Konrad Wrona, principal scientist at the NATO Communications & Information Agency (NCIA). 

It will take several years for systems to migrate to quantum-secure technology and right now it appears more realistic to combine cutting-edge algorithms with more traditional encryption to ensure interoperability into the future.

The technology has already been proposed to the Internet Engineering Taskforce (IETF) for open standardisation.

Post-Quantum has developed a suite of quantum-safe software products with a focus on identity, transmission and encryption, delivering end-to-end quantum-secure environments. “Over 10 years of deep R&D means we are well placed to engineer real-world quantum-safe solutions,” said Andersen Cheng, CEO of Post-Quantum. “This project with NATO is an important milestone in the world’s migration to a quantum-safe ecosystem. Organisations would be wise to take action now.”

NCIA:     NCIA:     Computer Weekly:      Oodaloop:     Post-Quantum:     Information Age:     ZDNet:     

You Might Also Read: 

Quantum Computing Will Have A Revolutionary Effect:

 

« Russia Threatens To Block Wikipedia
Microsoft Exchange Exploited By ‘Cuba’ »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

Invensis Learning

Invensis Learning

Invensis Learning is a professional training and certification company providing IT Service Management, IT Security & Governance, DevOps, Cloud Computing and Digital Awareness training.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

CyberKnight Technologies

CyberKnight Technologies

CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) headquartered in Dubai and covering the Middle East.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.