Cryptographically relevant quantum computers threaten to break classical
Where Can I Use This?
What Do I Need?
PAN-OS 11.1 or later.
Quantum computers (QCs) threaten network and data security. When QC development reaches a
mature state that produces cryptographically relevant quantum computers (CRQCs),
purpose-built to break decryption, many classical ciphers that were deemed safe will no
longer be able to prevent attackers from decrypting your data. This means that your
public key infrastructure (PKI) based on classical cryptography will be vulnerable to
post-quantum attacks. The threat is immediate, especially for long-lived data, because
of Harvest Now, Decrypt Later attacks, in which attackers
obtain the encrypted data and store it until they have a CRQC that can decrypt the
Resistance to attacks based on quantum computing begins with enhancing the key created
during the IKEv2 key exchange to safeguard your VPNs and with understanding your current
cryptography and post-quantum cryptographies (PQCs). Palo Alto Networks' solution to
resist quantum attacks is based on open standards to enable and ensure interoperability
with other equipment that meets the standards.
The first step is to implement RFC 8784 to create quantum-resistant IKEv2
VPNs as described in this document. Quantum-resistant VPNs can prevent attackers from
recording critical encrypted key material and prevent them from decrypting the data even
if they successfully steal the encrypted data. RFC 8784 provides a quantum-resistant
transition from today's classical cryptography to PQC.
This chapter describes QCs, the threat they pose to your data security, what you can do
about it now by creating quantum-resistant IKEv2 VPNs, and how to plan and prepare to
migrate to post-quantum VPNs and PQCs.