- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- Embracing the future of quantum-resistant cryptogr...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Embracing the future of quantum-resistant cryptography with HPE ProLiant Compute Gen12
Quantum computing promises to solve problems that are currently impossible to address with traditional computing. But, while it offers significant advancements, quantum computing can also pose serious threats to current security measures. Learn how you can mitigate the risk.
Introduction: What is quantum-resistant cryptography?
Quantum-resistant cryptography, also known as post-quantum cryptography (PQC), refers to cryptographic algorithms that are designed to be secure against the potential threats posed by quantum computers. Quantum computers, with their advanced computational capabilities, have the potential to break current cryptographic algorithms, making it essential to develop and adopt quantum-resistant solutions to ensure data security in your data center of the future.
Understanding CNSA 2.0 and the quantum threat
Quantum computing promises to solve problems that are currently impossible with traditional computing. It can perform complex calculations and simulations much faster than today's systems. But, while it offers significant advancements, it also poses serious threats to current security measures.
Quantum computers will have such advanced computing capabilities that they will be able to break current cryptographic algorithms, posing a significant threat to data security. This will enable the compromise of key agreement and signing algorithms, allowing malicious parties to sign software and firmware to appear authentic while being compromised.
The CNSA 2.0 guidelines [i] [ii], released by the National Security Agency (NSA)[iii], mark a critical step toward securing national security systems against quantum computing attacks. These guidelines highlight the urgency of transitioning to quantum-resistant (QR) algorithms to mitigate the risk posed by quantum computers.
Customer pain points addressed by quantum-resistant technology
Quantum-resistant technology addresses critical customer pain points by ensuring data security against the advanced computational power of quantum computers. It provides robust protection for sensitive information, mitigates the risks associated with current cryptographic algorithms, and facilitates a smoother transition to post-quantum cryptographic solutions.
Quantum threats
Quantum computers have the potential to break current cryptographic algorithms, posing a significant risk to data security. This means that the key agreement and signing algorithms we rely on today could become obsolete, allowing malicious actors to compromise data integrity and undermine trust in digital communications.
Standardization efforts
Organizations like the National Institute of Standards and Technology (NIST) rigorously test and standardize post-quantum cryptographic (PQC) algorithms to withstand quantum attacks. These efforts ensure that the new cryptographic standards are robust, reliable, and capable of protecting data against the advanced computational power of quantum computers.
Transition challenges
Transitioning to PQC is complex and requires addressing the computational and storage requirements of PQC algorithms. This involves updating existing systems, ensuring compatibility with new algorithms, and managing the increased computational load that PQC algorithms may impose on hardware and software infrastructure.
Industry readiness
Companies must start preparing now by identifying critical systems requiring strong cryptographic primitives. This proactive approach involves assessing current security measures, prioritizing systems that handle sensitive data, and developing a roadmap for integrating PQC solutions to safeguard against future quantum threats.
Implementation strategy
Evaluating current cryptographic implementations and planning for PQC algorithm integration is essential. This strategy includes conducting a thorough analysis of existing cryptographic methods, determining the feasibility of adopting PQC algorithms, and ensuring that the necessary hardware and software support is in place to facilitate a smooth transition.
Partnerships and collaboration
Collaborating with industry peers, cryptographic experts, and standard bodies is crucial to staying ahead in the PQC transition. By working together, organizations can share knowledge, resources, and best practices, ensuring that they are well-prepared to implement PQC solutions and address emerging security challenges.
Futureproofing
Incorporating flexible and scalable cryptographic solutions to adapt quickly as PQC standards evolve is vital. This approach ensures that organizations can respond to new developments in quantum computing and cryptography, maintaining robust security measures that protect data against evolving threats.
HPE ProLiant Compute Gen12 addresses these customer pain points
HPE ProLiant Compute Gen12 is designed to meet the evolving security needs of our customers, aligning with the CNSA 2.0 timelines. By incorporating state-of-the-art cryptographic solutions, HPE ensures that your customers' critical data remains secure in a post-quantum world.
- Firmware flash updates leverage quantum-resistant signing algorithms. Firmware flash updates for ProLiant Compute Gen12 iLO7 will be signed and authenticated using a CNSA 2.0 approved algorithm, preventing malicious entities with quantum computers from creating indistinguishable malicious firmware. Additionally, iLO7 can authenticate other firmware updates signed with quantum-resistant algorithms, enhancing future security.
- Silicon root of trust is enhanced with quantum-resistant algorithms. HPE ProLiant Compute Gen12 systems feature an enhanced silicon root of trust using quantum-resistant algorithms. During power-up, the iLO7 firmware is authenticated with these algorithms, preventing attackers with quantum computers and physical access from replacing the authentic firmware with malicious versions.
- Industry leaders as part of the ecosystem. Industry leaders like Thales and DigiCert highlight the importance of future-proofing crypto strategies in the post-quantum age. Their alignment with HPE's vision underscores the importance of proactive measures to ensure data security.
Key takeaways and actions
As we navigate the quantum era, HPE ProLiant Compute Gen12 is a beacon of security and innovation. By aligning with CNSA 2.0 timelines and integrating quantum-resistant algorithms, HPE ensures that your customers' data remains secure against quantum threats. Partner with us on this journey to a safe, post-quantum world.
Stay ahead, stay secure!
To learn more, please check out our website.
Meet HPE Blogger Cole Humphreys.
Cole leads Global Cyber Security Product Management at HPE with responsibility for the security features and technologies embedded within HPE’s Compute portfolio. Be sure to check out this article that he authored, too: Securing the edge: trust nothing, verify everything
Compute Experts
Hewlett Packard Enterprise
twitter.com/hpe_compute
linkedin.com/showcase/hpe-servers-and-systems/
hpe.com/servers
[i] [NSA's Future Quantum-Resistant Algorithm Requirements for National Security] (https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3148990/nsa-releases-future-quantum-resistant-qr-algorithm-requirements-for-national-se/ )
[ii] CNSA 2.0 FAQ] (https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF )
[iii] [CNSA 2.0 FAQ] (https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF )
- Back to Blog
- Newer Article
- Older Article
- PerryS on: Explore key updates and enhancements for HPE OneVi...
- Dale Brown on: Going beyond large language models with smart appl...
- alimohammadi on: How to choose the right HPE ProLiant Gen11 AMD ser...
- ComputeExperts on: Did you know that liquid cooling is currently avai...
- Jams_C_Servers on: If you’re not using Compute Ops Management yet, yo...
- AmitSharmaAPJ on: HPE servers and AMD EPYC™ 9004X CPUs accelerate te...
- AmandaC1 on: HPE Superdome Flex family earns highest availabili...
- ComputeExperts on: New release: What you need to know about HPE OneVi...
- JimLoi on: 5 things to consider before moving mission-critica...
- Jim Loiacono on: Confused with RISE with SAP S/4HANA options? Let m...
-
COMPOSABLE
77 -
CORE AND EDGE COMPUTE
146 -
CORE COMPUTE
155 -
HPC & SUPERCOMPUTING
138 -
Mission Critical
88 -
SMB
169