Enhancing Security with Post-Quantum Cryptography: CommScope's Expertise and Solutions

Senior Director, Security Solutions
5 minute read

Quantum computing

As quantum computing technology advances, traditional public-key cryptography methods like RSA, Diffie-Hellman (DH), and Elliptic Curve Cryptography (ECC) face significant vulnerabilities. With the potential for quantum computers to compromise these cryptographic algorithms within the next decade, transitioning to Post-Quantum Cryptography (PQC) is imperative for maintaining robust data security.

Post-Quantum Cryptography (PQC) and the NIST New PQC Standard

Post-Quantum Cryptography encompasses cryptographic algorithms designed to be secure against quantum computing threats. Unlike classical algorithms, PQC algorithms have been designed to withstand attacks from quantum computers, thus ensuring data security in a future where quantum capabilities are prevalent.

The National Institute of Standards and Technology (NIST) is leading the charge in standardizing these algorithms. Earlier this week, NIST released the first 3 finalized post-quantum encryption standards. These standards have defined the algorithms that will form the backbone of future secure communication systems, and NIST is encouraging the industry to begin transitioning to the new standards as soon as possible.

According to NIST’s press release, “the new standards are designed for two essential tasks for which encryption is typically used: general encryption, used to protect information exchanged across a public network; and digital signatures, used for identity authentication.” The three new PQC standards include two algorithm families (hash-based and lattice-based), each offering unique approaches to quantum resistance. These algorithms are designed to eventually replace public-key cryptographic methods, such as RSA, ECC, and DH, which are vulnerable to quantum attacks.

The Importance of Early Adoption

Adopting Post-Quantum Cryptography (PQC) solutions early offers several strategic advantages. Firstly, it provides proactive protection by safeguarding today’s data against potential vulnerabilities posed by future quantum technologies. Attackers can record and capture sensitive transactions and information now, intending to break the encryption with quantum computers later, especially compromising user-sensitive data.

Secondly, it mitigates various risks during the transition, including potential incompatibility with existing systems, the need for extensive testing to ensure reliability, and the challenge of securely migrating sensitive data without breach. Addressing these risks early reduces vulnerability to attacks.

Additionally, early adoption ensures regulatory compliance by aligning with emerging regulations and standards related to quantum security. Finally, it grants a competitive advantage by showcasing forward-thinking leadership in data security, enhancing the organization’s reputation and trust with customers and partners.

Migration to PQC: A Practical Approach

Transitioning to Post-Quantum Cryptography (PQC) does not require quantum hardware applications. However, the transition process is complex and involves much more than replacing existing cryptographic algorithms. Understanding the specific functionalities and strengths of these algorithms is crucial for effective integration and it requires careful consideration of software agility. In particular, PQC algorithms differ significantly from traditional public key algorithms (RSA, DH and ECC), resulting in variations (mostly increases) in signature sizes, ciphertext sizes, key sizes, and computational times. These changes impact secure storage, Hardware Security Modules (HSM), message protocols, application code, and database schemas and attributes, which affect previously stored data and necessitate data migration. Additionally, updates are required for both infrastructure and interfacing systems, including, for example, client-side applications.

Given the extensive scope of migrating to post-quantum cryptography (PQC), a phased and well-planned approach is crucial. Implementing a single sweeping update for all distributed client devices and multiple system components in a large distributed infrastructure is impractical. Therefore, careful planning is needed to manage the transition efficiently. An effective mechanism to handle staggered updates across various systems addressing different types of devices is essential to ensure comprehensive coverage of all components. By aligning with the practical needs of PQC integration, the migration can be smooth and effective, addressing all security and operational concerns.

How CommScope Can Support Your PQC Transition

This transition to PQC is not just about implementing PQC algorithms; it also requires deploying PQC-based device credentials keys and certificates that are unique to each device, serving as the cornerstone for PQC-resistant applications. As a result, there is a growing need for a migration strategy that includes both factory provisioning and in-field updates of PQC-based device credentials to address the transition needs of both new and existing devices.

To execute this transition effectively, significant investment in infrastructure, technology, and security expertise is required, along with audits to ensure compliance with the latest standards. This is where CommScope steps in as a trusted partner.

Upgrading Cryptographic Keys and Certificates

Digital keys and certificates are crucial in today's interconnected world, forming the foundation for secure communication and data protection. Their widespread adoption across industries has enabled seamless encryption, authentication, and authorization processes. As we transition to PQC-based algorithms, one of the first critical steps is upgrading the keys and certificates already installed on devices deployed in networks and customer homes.

CommScope's PKI Center™ has delivered over six billion device credentials across more than 200 OEM/ODM/Repair Service locations in 30+ countries. Additionally, CommScope has provided in-field update solutions to over 20 leading domestic and international service providers, enabling seamless device credential upgrades and enhancing security in real-world deployments. Our extensive 15-year collaboration with network equipment providers, device manufacturers, and service providers to update in-field devices has given us deep insights into the complexities of PKI services. We have already developed a robust infrastructure with controlled, staged rollout and authorization mechanisms.

Our holistic perspective goes beyond the technical aspects, incorporating real-world nuances and best practices. This comprehensive understanding enables us to effectively address the challenges of transitioning to PQC for customers across diverse infrastructures, ensuring real-time or simultaneous updates for various products and devices. Our infrastructure is designed to scale efficiently, with an annual capacity to generate 30 billion cryptographic keys and certificates, ensuring a secure foundation for future expansion.

Upgrading Software and Code Signing Mechanisms

As we know, whoever controls the software controls the devices and infrastructure, making software security critically important. With the advent of quantum computing, traditional cryptographic algorithms used in code signing and encryption are at risk of being broken, which could lead to widespread vulnerabilities. This makes the transition to PQC essential to maintain the integrity of software updates. Recent high-profile incidents have highlighted the growing threats to valuable software that attracts hackers. To address these challenges, both government and industry are increasingly focusing on securing the software supply chain. Central to this effort is establishing a strong Root of Trust, which enables secure boot processes. For example, a bootloader can verify the platform code, and the platform code can then verify the application code, creating a chain of trust that ensures only trusted software runs on devices.

CommScope’s cloud-based signing platform, PRiSM (Permission Rights Signer Manager), has executed approximately 50 million code signings and encryptions in standard or proprietary formats required by chip vendors. All sensitive signing and encryption keys are protected by FIPS-certified Hardware Security Modules (HSMs). These, along with customer-specific access controls for different software types (bootloader, platform code, application code), safeguard against unauthorized access and ensure the integrity of your software supply chain. Our extensive experience with chip and HSM vendors enables close collaboration on implementing post-quantum cryptography (PQC) solutions.

Conclusion

CommScope now offers a comprehensive PQC library featuring the latest algorithms standardized by NIST. Our PQC-enabled code signing platform will be available by Q4 2024. Additionally, PQC-based device identity provisioning is expected by Q1 2025.

Leveraging our extensive expertise, tools, and infrastructure, CommScope is dedicated to helping customers swiftly secure their devices as quantum computing advances. For more information on how we can assist with your PQC needs, please contact us at https://www.pki-center.com/contact-us