CONNECTING THE DEFENCE COMMUNITY WITH INSIGHT, INTELLIGENCE & OPPORTUNITIES

Officially Supported By: Defence Contracts International Supply2Defence

Official Media Partners for:

Advances in Quantum Computing are placing the encryption algorithms and protocols that protect everything from commercial banking to defence grade communications services at risk. What steps are needed to protect future communications and is simply adopting PQC enough?

Post Quantum Cryptography (PQC) was one of the hot cybersecurity topics last year and 2025 will be no different. Back in 1994 Peter Shor, now a professor at MIT, published an algorithm for finding the prime factors of an integer. While this may sound like a topic of limited interest, factoring large integers forms the foundation of many of the cryptographic protocols in use today. Generating large prime numbers is easy. Multiplying two large primes to get an even larger number is also easy. The whole process can be completed in fractions of a second. The reverse process, factoring a large number to recover the component primes is computationally very difficult. The process can take billions of years on even a powerful traditional computer. This asymmetry is exploited in algorithms such as RSA and Diffie-Hellman to implement key generation and key exchange protocols. Two systems wishing to protect information exchange can establish a shared key for data encryption. An attacker monitoring the encrypted data exchange will not be able to reconstruct the encryption key in any useful timescale.

Shor’s algorithm changes all this. The algorithm can factor a large number in seconds. An attacker can exploit Shor’s algorithm to recover an encryption key and read the content of a captured data transfer in near real-time. Shor’s algorithm is a quantum algorithm that runs on a quantum computer.

As of the start of 2025 quantum computers large enough or stable enough to run Shor’s algorithm and recover an encryption key of realistic length do not exist. However, with advances in quantum research, it is likely that a suitable quantum computer will exist in the next 5-10 years. This poses the real risk of harvest now, decrypt later. An attacker can monitor encrypted communications today and save the captured data for decryption in the future. If the information exchange in a communications session needs to be protected for 5 years or more, then action needs to be taken now to ensure future security.

Fortunately, the security community has not been idle. There are now a number or replacement algorithms that are secure against a quantum computer attack and provide effective Post

Quantum Cryptography. Three of the algorithms have been registered as FIPS standards. There is now a rush of software vendors announcing support for PQC.

Despite the excitement over PQC, it is not the complete answer. Firstly, the quantum threat affects only asymmetric encryption algorithms (public/private key algorithms). These algorithms play an important role in setting up encrypted communication including securely establishing a shared key for bulk data encryption with a symmetric algorithm. Symmetric algorithms such as AES are not compromised by a quantum computer attack. Secondly, encryption is only one component of a security policy, although an important one. Encryption must be combined with defences against a range of threats. An attacker targeting an encrypted voice or video call is likely to target the communication endpoints and monitor the audio/video streams after they have been decrypted for playing to the end-user.

UM Labs specialises in securing standards based real-time communication. Unicus®, the company’s security platform, is designed to protect standards based real-time communication services on IP networks. This includes voice and video calls, static and mobile surveillance covering body cameras, drones and fixed cameras, cloud extended reality (CXR) services and IoT applications ranging from simple monitor/actuator systems to complex remote control applications. Unicus implements a layered security policy with a core/edge architecture ensuing that all endpoints of a real-time communications network are protected. Both edge and core components include PQC providing encryption to meet elevated security requirements in a post quantum world.

UM Labs is at DPRTE in Farnborough on the 26th and 27th March, come and see us on stand 136, visit our website at www.um-labs.com or contact us at info@um-labs.com.

 

communications computing quantum UM Labs

Post written by: Vicky Maggiani

Vicky has worked in media for over 20 years and has a wealth of experience in editing and creating copy for a variety of sectors.

RELATED ARTICLES

The Royal Fleet Auxiliary ship Argus is the first military vessel to deploy low Earth orbit (LEO) satellite internet for her 400-strong crew

September 15, 2023

Maritime - RFA Ship installs High-speed connectivity

The Royal Fleet Auxiliary ship Argus is the first military vessel to deploy low Earth orbit (LEO) satellite internet for

The MOD has awarded BAE Systems an £89M contract to enhance front-line connectivity for military personnel, linking small reconnaissance drones, combat vehicles, fighter jets, aircraft carriers and military commands.

August 29, 2023

Land - MOD awards £89M communications contract to BAE

The MOD has awarded BAE Systems an £89M contract to enhance front-line connectivity for military personnel, linking small reconnaissance drones,