Security Program Controls/Technologies, Asset Management, Security Strategy, Plan, Budget
White House rolls out new timelines, mandates for ‘post quantum’ encryption replacement

The U.S. Capitol dome is seen from the Pentagon in Arlington, Va., on Sept. 11, 2021. (Cpl. Zachery Perkins/Army)
The federal government’s plan to switch out its older encryption for newer algorithms capable of withstanding hacking threats from quantum computers received a big boost this week as the Biden administration rolled out new mandates and timelines for departments and agencies.In a new national security memorandum issued Wednesday, the White House makes supremacy in the quantum realm the official policy of the United States and lays out a host of timelines and mandates for the “timely and equitable” replacement of classical, public-key encryption algorithms in federal systems and devices.While quantum computers are still years away from posing a realistic threat to encryption, experts in cryptography and quantum science say it is only a matter of time before the emergence of a quantum computer capable of breaking through such classical, public-key encryption protocols — putting federal data at risk.Such computers, the White House memo said, “could jeopardize civilian and military communications, undermine supervisory and control systems for critical infrastructure, and defeat security protocols for most Internet-based financial transactions.” Within three months, agencies that develop, acquire or fund research into quantum computing must coordinate with the White House Director of the Office of Science and Technology Policy on a national strategy and workforce plan.The memo places the Office of Management and Budget, the national cyber director, the directors of the Cybersecurity and Infrastructure Security Agency, the National Institute for Standards and Technology and the National Security Agency in charge of inventorying all federal systems and assets that rely on public-key algorithms, the form of classical encryption most likely to be broken by a future quantum computer.That will clear the way for prioritizing the replacement of high-value or critical government systems, and individual agencies will have a year to submit their own inventories to CISA and the national cyber director, who must scope out budget and funding needs surrounding the transition by October 2023. Agencies will need to update these inventories on a yearly basis and provide periodic reports on efforts to replace high value systems.It tasks the secretary of Commerce to form a working group of critical infrastructure owners and operators and other stakeholders to identify tools and datasets to help the National Institute for Standards and Technology develop guidance and best practices for implementing quantum resistant encryption. NIST will also stand up and lead a project through its National Cybersecurity Center of Excellence to engage with industry on the same issues. By November 2022, CISA and sector-risk management agencies must coordinate on a plan to engage critical infrastructure on their own migration plans.That time may now for agencies like the NSA, which is moving forward with its own separate plan to replace the public-key encryption algorithms underpinning the systems and data at intelligence agencies. Charged with guarding some of the country’s most sensitive secrets, these agencies are under heightened risk that foreign governments may decide to hoover up and collect as much encrypted data as possible today, in the hopes of cracking them down the line when quantum technologies mature.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds