Quantum Security Concepts
Focus
Focus
Network Security

Quantum Security Concepts

Table of Contents

Quantum Security Concepts

Cryptographically relevant quantum computers threaten to break classical cryptography.
Where Can I Use This?
What Do I Need?
  • PAN-OS
  • PAN-OS 11.1 or later.
Quantum computers (QCs) threaten network and data security. When QC development reaches a mature state that produces cryptographically relevant quantum computers (CRQCs), purpose-built to break decryption, many classical ciphers that were deemed safe will no longer be able to prevent attackers from decrypting your data. This means that your public key infrastructure (PKI) based on classical cryptography will be vulnerable to post-quantum attacks. The threat is immediate, especially for long-lived data, because of Harvest Now, Decrypt Later attacks, in which attackers obtain the encrypted data and store it until they have a CRQC that can decrypt the data.
Resistance to attacks based on quantum computing begins with enhancing the key created during the IKEv2 key exchange to safeguard your VPNs and with understanding your current cryptography and post-quantum cryptographies (PQCs). Palo Alto Networks' solution to resist quantum attacks is based on open standards to enable and ensure interoperability with other equipment that meets the standards.
The first step is to implement RFC 8784 to create quantum-resistant IKEv2 VPNs as described in this document. Quantum-resistant VPNs can prevent attackers from recording critical encrypted key material and prevent them from decrypting the data even if they successfully steal the encrypted data. RFC 8784 provides a quantum-resistant transition from today's classical cryptography to PQC.
This chapter describes QCs, the threat they pose to your data security, what you can do about it now by creating quantum-resistant IKEv2 VPNs, and how to plan and prepare to migrate to post-quantum VPNs and PQCs.

Recommended For You