<section title="2.4. Preparation for Post-Quantum Cryptography"><subsection title="Objective"><paragraph
    title="2.4.1."


><![CDATA[<p class="NormS2C4">Agencies are prepared for the impacts that widespread availability of quantum computing will have on information security.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="2.4.2."


><![CDATA[<p>This section provides information for agencies to assist with preparation for the impacts of quantum computing on information security, and more specifically impacts related to encryption.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="2.4.3."


><![CDATA[<p class="NormS2C4">There has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. The pace of this research is accelerating.</p>]]></paragraph>
<paragraph
    title="2.4.4."


><![CDATA[<p class="NormS2C4">The development of quantum computing is a rapidly advancing area with multiple innovations being announced regularly, often eclipsing previous forecasts.</p>]]></paragraph>
<paragraph
    title="2.4.5."


><![CDATA[<p class="NormS2C4">Quantum computers are not expected to fully replace classical computers as quantum effects are currently useful only on particular tasks. However quantum computers will be able to rapidly solve highly complex problems, well beyond the capabilities of today’s supercomputers.</p>]]></paragraph>
<paragraph
    title="2.4.6."


><![CDATA[<p class="NormS2C4">A prominent area of quantum computing applicability is in the field of cryptanalysis, and it is expected that they will be able to compromise or render ineffective many of the public-key cryptosystems currently in use.</p>]]></paragraph>
<paragraph
    title="2.4.7."


><![CDATA[<p class="NormS2C4">It is important that agencies are aware of the potential impact developments in quantum computing are likely to have on critical security controls such as encryption.  It is also important that they are preparing to act to minimise the disruptions that could be caused during migrations to post-quantum cryptography (cryptographic systems that remain secure after the widespread availability of quantum computing).</p>]]></paragraph>
<paragraph
    title="2.4.8."


><![CDATA[<p class="NormS2C4">Currently there are no post-quantum cryptographic systems approved for use in the NZISM, however there are actions that agencies can undertake to prepare for the time when such systems are approved.</p>]]></paragraph>
</block>
<block title="Post-Quantum Cryptographic Standards"><paragraph
    title="2.4.9."


><![CDATA[<p class="NormS2C4">International organisations are evaluating potential candidates for standardisation in post-quantum cryptography.  GCSB will review applicable standards and consider them for incorporation into the NZISM when they are published.</p>]]></paragraph>
<paragraph
    title="2.4.10."


><![CDATA[<p class="NormS2C4">When standards for quantum-resistant public key cryptography become available, GCSB may deprecate or withdraw support for existing classical cryptographic standards. Agencies should therefore be prepared to transition away from these algorithms possibly in the next 2-3 years, even though the standards to migrate to are still to be developed.</p>]]></paragraph>
<paragraph
    title="2.4.11."


><![CDATA[<p class="NormS2C4">Until new quantum-resistant algorithms are standardised, agencies should maintain or strengthen their existing cryptographic position using the algorithms, protocols and key lengths specified in <a title="Chapter 17 - Cryptography" rel="noopener noreferrer" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745" target="_blank">Chapter 17 - Cryptography</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="2.4.12."


><![CDATA[<p class="NormS2C4">Additional guidance on post-quantum cryptography can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Getting Ready for Post-Quantum Cryptography</td>
<td style="text-align: center;">
<p>NIST</p>
<p>National Institute for Standards and Technology</p>
</td>
<td><a title="Getting Ready for Post-Quantum Cryptography" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf [PDF, 401 KB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span>Post-Quantum Cryptography Project (NIST)</span></td>
<td style="text-align: center;">
<p>NIST</p>
<p>National Institute for Standards and Technology</p>
</td>
<td><a title="Post-Quantum Cryptography Project (NIST)" rel="noopener noreferrer" href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank">https://csrc.nist.gov/projects/post-quantum-cryptography</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Post-Quantum Cryptography</td>
<td style="text-align: center;">Department of Homeland Security (US DHS)</td>
<td><a title="Post-Quantum Cryptography" rel="noopener noreferrer" href="https://dhs.gov/quantum" target="_blank">https://dhs.gov/quantum</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p class="Default">Migration To&nbsp;Post-Quantum Cryptography</p>
</td>
<td style="text-align: center;">National Cybersecurity Center of Excellence (US NCCoE)</td>
<td><a title="Migration To&nbsp;Post-Quantum Cryptography" rel="noopener noreferrer" href="https://nccoe.nist.gov/sites/default/files/library/project-descriptions/pqc-migration-project-description-final.pdf" target="_blank">https://nccoe.nist.gov/sites/default/files/library/project-descriptions/pqc-migration-project-description-final.pdf [PDF, 386 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Post-Quantum Cryptography Preparation"><paragraph
    title="2.4.13.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


><![CDATA[<p>International organisations are in the process of developing standards for post-quantum cryptographic algorithms. The standards will be reviewed and incorporated into the NZISM as they are published.</p>]]></paragraph>
<paragraph
    title="2.4.13.R.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


><![CDATA[<p>As standards are still under development the form of post-quantum cryptography is not fully determined at this point in time. </p>]]></paragraph>
<paragraph
    title="2.4.13.R.03."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


><![CDATA[<p>It is recognised that providing guidance on the concrete and achievable steps that can be taken now to prepare for the transition to post-quantum cryptography will help ensure a smooth and efficient transition to any new standards that become available.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7206"
><![CDATA[<p>Agencies SHOULD ensure they are aware of the latest developments in post-quantum cryptography.  GCSB is tracking these developments and will continue to provide advice through the NZISM.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7207"
><![CDATA[<p>Agencies SHOULD maintain an inventory of sensitive and critical datasets that must be secured for an extended amount of time.&nbsp; This will ensure datasets that may be at risk now and decrypted once a cryptographically relevant quantum computer is available are not secured solely through the use of quantum vulnerable cryptography.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.03."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7208"
><![CDATA[<p>Agencies SHOULD conduct an inventory of systems using cryptographic technologies to determine the potential size and scope of future transition work once post-quantum cryptographic systems become available.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.04."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7209"
><![CDATA[<p>Agencies SHOULD identify which systems in their inventory rely on public key cryptography and note them as quantum vulnerable in agency risk assessments.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.05."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7210"
><![CDATA[<p>Agencies SHOULD determine a priority order for quantum vulnerable systems to be transitioned from classical cryptography to post-quantum cryptography.</p>]]></paragraph>
<paragraph
    title="2.4.13.C.06."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7211"
><![CDATA[<p>Agencies SHOULD consider the following factors when prioritising the quantum vulnerable systems:</p>
<ul>
<li>Is the system a high value asset based on agency requirements?</li>
<li>Does the system protect sensitive information (e.g., key stores, passwords, root keys, signing keys, personal information, and classified information)?</li>
<li>Do other systems (internal or external to the agency) depend on the cryptographic protections in place on the quantum vulnerable system?</li>
<li>How long does the data need to be protected?</li>
</ul>]]></paragraph>
<paragraph
    title="2.4.13.C.07."

    tags="Approved Cryptographic Algorithms,Cryptography,Governance"


    classification="All Classifications"
    compliance="Should"
    cid="7212"
><![CDATA[<p>Using the inventory and prioritisation information, agencies SHOULD develop a plan for system transitions upon publication of the new post-quantum cryptographic standard.</p>]]></paragraph>
</block>
</subsection>
</section>
