Servers & Systems: The Right Compute
1825515 Members
1838 Online
109681 Solutions
New Article
ComputeExperts

Embracing the future of quantum-resistant cryptography with HPE ProLiant Compute Gen12

Quantum computing promises to solve problems that are currently impossible to address with traditional computing. But, while it offers significant advancements, quantum computing can also pose serious threats to current security measures. Learn how you can mitigate the risk.

Embracing quantum-resistant-cryptography_blog_GettyImages-1406018349_green_800_0_72_RGB.jpgIntroduction: What is quantum-resistant cryptography?

Quantum-resistant cryptography, also known as post-quantum cryptography (PQC), refers to cryptographic algorithms that are designed to be secure against the potential threats posed by quantum computers. Quantum computers, with their advanced computational capabilities, have the potential to break current cryptographic algorithms, making it essential to develop and adopt quantum-resistant solutions to ensure data security in your data center of the future.

Understanding CNSA 2.0 and the quantum threat

Quantum computing promises to solve problems that are currently impossible with traditional computing. It can perform complex calculations and simulations much faster than today's systems. But, while it offers significant advancements, it also poses serious threats to current security measures.

Quantum computers will have such advanced computing capabilities that they will be able to break current cryptographic algorithms, posing a significant threat to data security. This will enable the compromise of key agreement and signing algorithms, allowing malicious parties to sign software and firmware to appear authentic while being compromised.

The CNSA 2.0 guidelines [i] [ii], released by the National Security Agency (NSA)[iii], mark a critical step toward securing national security systems against quantum computing attacks. These guidelines highlight the urgency of transitioning to quantum-resistant (QR) algorithms to mitigate the risk posed by quantum computers.

Customer pain points addressed by quantum-resistant technology

Quantum-resistant technology addresses critical customer pain points by ensuring data security against the advanced computational power of quantum computers. It provides robust protection for sensitive information, mitigates the risks associated with current cryptographic algorithms, and facilitates a smoother transition to post-quantum cryptographic solutions.

Quantum threats 

Quantum computers have the potential to break current cryptographic algorithms, posing a significant risk to data security. This means that the key agreement and signing algorithms we rely on today could become obsolete, allowing malicious actors to compromise data integrity and undermine trust in digital communications.

Standardization efforts 

Organizations like the National Institute of Standards and Technology (NIST) rigorously test and standardize post-quantum cryptographic (PQC) algorithms to withstand quantum attacks. These efforts ensure that the new cryptographic standards are robust, reliable, and capable of protecting data against the advanced computational power of quantum computers.

Transition challenges

Transitioning to PQC is complex and requires addressing the computational and storage requirements of PQC algorithms. This involves updating existing systems, ensuring compatibility with new algorithms, and managing the increased computational load that PQC algorithms may impose on hardware and software infrastructure.

Industry readiness 

Companies must start preparing now by identifying critical systems requiring strong cryptographic primitives. This proactive approach involves assessing current security measures, prioritizing systems that handle sensitive data, and developing a roadmap for integrating PQC solutions to safeguard against future quantum threats.

Implementation strategy 

Evaluating current cryptographic implementations and planning for PQC algorithm integration is essential. This strategy includes conducting a thorough analysis of existing cryptographic methods, determining the feasibility of adopting PQC algorithms, and ensuring that the necessary hardware and software support is in place to facilitate a smooth transition.

Partnerships and collaboration

Collaborating with industry peers, cryptographic experts, and standard bodies is crucial to staying ahead in the PQC transition. By working together, organizations can share knowledge, resources, and best practices, ensuring that they are well-prepared to implement PQC solutions and address emerging security challenges.

Futureproofing 

Incorporating flexible and scalable cryptographic solutions to adapt quickly as PQC standards evolve is vital. This approach ensures that organizations can respond to new developments in quantum computing and cryptography, maintaining robust security measures that protect data against evolving threats.

HPE ProLiant Compute Gen12 addresses these customer pain points

HPE ProLiant Compute Gen12 is designed to meet the evolving security needs of our customers, aligning with the CNSA 2.0 timelines. By incorporating state-of-the-art cryptographic solutions, HPE ensures that your customers' critical data remains secure in a post-quantum world.

  • Firmware flash updates leverage quantum-resistant signing algorithms. Firmware flash updates for ProLiant Compute Gen12 iLO7 will be signed and authenticated using a CNSA 2.0 approved algorithm, preventing malicious entities with quantum computers from creating indistinguishable malicious firmware. Additionally, iLO7 can authenticate other firmware updates signed with quantum-resistant algorithms, enhancing future security.
  • Silicon root of trust is enhanced with quantum-resistant algorithms. HPE ProLiant Compute Gen12 systems feature an enhanced silicon root of trust using quantum-resistant algorithms. During power-up, the iLO7 firmware is authenticated with these algorithms, preventing attackers with quantum computers and physical access from replacing the authentic firmware with malicious versions.
  • Industry leaders as part of the ecosystem. Industry leaders like Thales and DigiCert highlight the importance of future-proofing crypto strategies in the post-quantum age. Their alignment with HPE's vision underscores the importance of proactive measures to ensure data security.

Key takeaways and actions

As we navigate the quantum era, HPE ProLiant Compute Gen12 is a beacon of security and innovation. By aligning with CNSA 2.0 timelines and integrating quantum-resistant algorithms, HPE ensures that your customers' data remains secure against quantum threats. Partner with us on this journey to a safe, post-quantum world.

Stay ahead, stay secure!

To learn more, please check out our website.

Cole Humphreys_headshot_1565883677862.jfifMeet HPE Blogger Cole Humphreys.

Cole leads Global Cyber Security Product Management at HPE with responsibility for the security features and technologies embedded within HPE’s Compute portfolio. Be sure to check out this article that he authored, too: Securing the edge: trust nothing, verify everything 


Compute Experts
Hewlett Packard Enterprise

twitter.com/hpe_compute
linkedin.com/showcase/hpe-servers-and-systems/
hpe.com/servers

 
[i] [NSA's Future Quantum-Resistant Algorithm Requirements for National Security] (https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3148990/nsa-releases-future-quantum-resistant-qr-algorithm-requirements-for-national-se/ )
[ii] CNSA 2.0 FAQ] (https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF )
[iii] [CNSA 2.0 FAQ] (https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF )

 

 

 

About the Author

ComputeExperts

Our team of Hewlett Packard Enterprise server experts helps you to dive deep into relevant infrastructure topics.