PQC and Decryption
Focus
Focus
Network Security

PQC and Decryption

Table of Contents

PQC and Decryption

This chapter focuses on post-quantum cryptography features, tools, and tasks that rely on decryption.
Where Can I Use This?What Do I Need?
No separate license required for decryption when using NGFWs or Prisma Access.
Note: The features and capabilities available to you in Strata Cloud Manager depend on your active license(s).
Post-quantum cryptography (PQC), also known as quantum-resistant cryptography refers to a cryptographic system designed to secure communications against the capabilities of quantum and classical computers. As quantum computers advance, they will eventually be able to quickly solve and break the public-key cryptographic systems widely trusted today. Quantum algorithms, such as Shor's algorithm, have demonstrated the ability to efficiently factor large numbers, quickly breaking classical cryptosystems. Another concern is Harvest Now, Decrypt Later attacks in which bad actors collect and store encrypted data today with the intention of decrypting it later, when the quantum computing tools needed to decrypt the data become available.
Post-quantum migration planning and preparation is critical given the current and evolving quantum computing threat to security. NIST standardization, the deployment of post-quantum algorithms and hybrid post-quantum algorithms by major enterprises and services, ongoing discussions, and research add to the urgency of planning and transitioning to PQC.
Today, decryption provides visibility and insights that help you harden network security and protect your organization from threats posed by early PQC use and advancements in post-quantum computing. You can control and monitor the usage of PQC on your network.The Palo Alto Networks NGFW detects, blocks, and logs the use of PQC and hybrid PQC algorithms in TLSv1.3 sessions. Decryption logs are an important tool for monitoring PQC activity on your network. Logs offer visibility into potential security risks associated with current PQC implementations and future quantum threats. Our decryption PQC enhancements aim to improve visibility and facilitate informed decision-making that can protect your network infrastructure. New support also prioritizes a smooth transition to PQC, maximum interoperability, and adaptability to future advancements.
To prepare for the future, you can assess the vulnerabilities in your current infrastructure and implement changes, such as blocking PQC use or deploying quantum-resistant VPNs.
The Quantum Security Administration guide provides additional context on post-quantum cryptography, the quantum computing threat, preparing your organization for quantum computing advancements, and features beyond decryption.