Artificial Intelligence
Cyber
Future Telecoms
Materials
Quantum
Robotics
Wise words and waggishness… December 2024
Reading time: 2 mins
More collaboration is needed for industry to mitigate current and future risks
Earlier this year, TI Sparkle, a leading international telecoms service provider, highlighted the practical need for quantum-safe communications by establishing the first quantum-safe Virtual Private Network (VPN) between Catania and Frankfurt. As quantum computing continues to advance, it presents a clear challenge to the telecoms industry and an urgent need to transition to quantum-resistant cryptography. Sparkle’s achievement provides a practical blueprint for telecoms operators everywhere, showing that proactive steps towards quantum security are not only necessary but also very much achievable today.
Quantum computers leverage the principles of quantum mechanics to solve some complex mathematical problems far more efficiently than classical computers. Traditional cryptographic methods like RSA and ECC, which form the backbone of current telecoms security, rely on the computational difficulty of these problems. With quantum computing these methods are significantly weakened, making them unsuitable for secure data transfer. Given the sensitive nature of the data transmitted over telecoms networks – including bank transactions, personal information and business communications – adopting quantum-resistant encryption is not just advisable, it is essential.
While many await the arrival of “Q-Day”, the reality is that the quantum threat is already here. There is mounting evidence of “Store Now, Decrypt Later” tactics where malicious actors collect encrypted data with the intent to decrypt it once quantum computing becomes sufficiently advanced. This means the sensitive information we send now could be exposed in the near future. Imagine the consequences if confidential government or corporate data, considered secure today, is revealed tomorrow. The strategic, financial and privacy losses could be catastrophic.
The National Institute of Standards and Technology (NIST) recently published a long-awaited list of Post-Quantum Algorithms (PQA) for standardisation offering protection against quantum threats. However, while an important milestone, these algorithms are only a part of the solution and are years away from widespread adoption. Organisations must not be complacent and must look for holistic solutions that can be implemented today.
Symmetric keys have emerged as the “gold standard” of quantum-safety and can be used simply and efficiently to protect large volumes of data. This simplicity makes them an attractive option for telecoms operators looking to enhance their security without undergoing costly and disruptive system overhauls. However, creating such keys at scale without relying on weakened algorithms has historically been challenging. Overcoming these challenges, as demonstrated by Sparkle using Symmetric Key Agreement (SKA) technology, can prove its effectiveness in securing data against emerging threats and vulnerabilities while meeting the demands of modern networks.
The rollout of 5G, the proliferation of IoT devices and extensive use of cloud and edge computing have significantly expanded the potential surface area for cyber attacks. This complexity is compounded by the heightened risks associated with data breaches.
For telecoms operators, the time to upgrade cryptography is now. This involves not only adopting proven technologies like SKA but also re-evaluating overall network security architectures to embrace zero-trust principles, where trust is neither assumed based on network location nor taken for granted. Proactive measures must be taken immediately to secure the integrity and confidentiality of communications, ensuring that we are not merely reacting to current threats but also pre-empting future vulnerabilities.
The introduction of 6G will likely amplify the challenges faced in 5G, including higher densities of connected devices and even more complex data transmission methods. This calls for a rethink of traditional security measures to ensure they are resilient enough to handle the advanced capabilities of 6G, and the quantum threat must be a central consideration in the development of 6G protocols.
Telecoms operators should integrate quantum-resistant algorithms from the ground up rather than retrofitting them into existing architectures. By embedding SKA into the very fabric of 6G technology, telecoms operators can safeguard against both current and future vulnerabilities.
The bottom line is that the telecoms industry can’t simply wait for quantum computing to become a pervasive threat before acting
Preparing for 6G will also require much collaboration between governments, technology providers and telecoms operators. Setting up regulatory frameworks that encourage the early adoption of quantum-safe technologies and support research in advanced cryptographic methods will be crucial. Additionally, international cooperation in standardising 6G security protocols will ensure a unified approach to telecoms security globally.
The bottom line is that the telecoms industry can’t simply wait for quantum computing to become a pervasive threat before acting. Quantum-safe solutions like SKA offer proven benefits and a practical, efficient, and cost-effective means to secure networks against quantum threats, now.
The transition must be strategic and incremental to minimise disruption and retain operational efficiencies. Conducting a comprehensive assessment of current security measures and identifying areas vulnerable to quantum attacks is the first step. Replacing the legacy of long-lived PKI certificates, which have a sketchy security history, with dynamic rotating authentication is another crucial step.
By taking proactive steps to integrate SKA, collaborating with industry peers and government bodies and staying informed about the latest developments, telecoms operators can safeguard their networks against current and future threats.
Artificial Intelligence
Future Telecoms
Materials
Quantum
Reading time: 3 mins
Robotics
Reading time: 3 mins
Future Telecoms
Reading time: 9 mins
Quantum
Reading time: 3 mins
Quantum
Reading time: 1 mins