Adopting post-quantum cryptography (PQC) is critical to protecting your organization
and its assets against
future quantum computers, which will break
today’s classical cryptography. Failure to adopt PQC early increases the risk of
compromise of sensitive data with attacks like Harvest Now, Decrypt Later already
under way. On the other hand, upgrading legacy applications and systems is a
time-consuming and costly process that risks service disruption and data security
without proper guardrails in place. Accounting for these concerns, PAN-OS® 12.1 adds
support for securing TLSv1.3 sessions using post-quantum (PQ) key encapsulation
mechanisms (KEMs) to SSL Forward Proxy, SSL Inbound Inspection, Decryption Mirror,
and the Network Packet Broker features.
In
decryption profiles, you can enable PQ
KEMs standardized by the National Institute of Standards and Technology (NIST) or
nonstandardized, experimental options. You can also specify if your selected
algorithms are preferred by the client-side, server-side, or both. Next-Generation
Firewalls (NGFWs) now serve as cipher translation proxies, translating between PQC
and classical encryption for applications that are not yet post-quantum ready. For
example, you can use quantum-safe encryption for communications between end users
and NGFWs but classical encryption for connections between an NGFW and
applications.
This solution secures both legacy and quantum-safe systems and applications, enables
you to meet PQC mandates, and reduces stress and complexity around PQC upgrades.