Connects decision-makers and solutions creators to what's next in quantum computing

The Quantum Security Supply Chain Is Only as Strong as Its Weakest Link

Tomorrow's quantum-resistant organizations will only be as secure as their most vulnerable supply chain partner

Brent Hansen, Vice president of federal sales engineering at Optiv + ClearShark

December 16, 2024

5 Min Read
Zeros and ones disappearing towards a vanishing point
Getty images

In a landmark development for cybersecurity, the National Institute of Standards and Technology (NIST) recently finalized three groundbreaking post-quantum encryption standards: ML-KEM (formerly Kyber), ML-DSA (formerly Dilithium) and SLH-DSA (known as Sphincs+), with FN-DSA (Falcon) designated for future standardization. While this milestone represents a crucial step in protecting our digital infrastructure, its implications extend far beyond individual organizations to encompass entire ecosystems.

The stakes couldn't be higher, especially when considering the interconnected nature of modern organizations. For years, nation-states have been systematically harvesting and storing encrypted data – a practice called "harvest now, decrypt later." This strategy becomes particularly alarming when considering supply chain relationships, where compromising one vendor's historical communications could expose sensitive information about dozens or even hundreds of partner organizations.

Think of it as a countdown clock ticking through complex supply chain networks. Every piece of encrypted data – from manufacturing specifications to financial details and customer data – could be vulnerable to future quantum decryption, creating cascading risks.

Related:Quantum Threatens to Be Encryption’s Y2K Moment

NIST's Post-Quantum Security Arsenal

NIST's new standards arrive as a powerful countermeasure to this looming threat, but their implementation will require unprecedented coordination across supply chains. These post-quantum cryptographic algorithms are specifically designed to resist attacks from both classical and quantum computers, but their effectiveness depends on universal adoption throughout partner networks.

ML-KEM, ML-DSA and SLH-DSA provide organizations like federal agencies the tools they need to secure their supply chain communications. However, the challenge lies not just in implementing these standards internally but in ensuring that every partner, vendor and customer in the supply chain is equally protected. A single weak link – like a smaller supplier using outdated encryption – could compromise the security of the entire network.

The release of these standards draws a clear line in the sand for organizations worldwide, potentially reshaping supplier relationships and partnerships more broadly. Large organizations may soon begin requiring quantum-resistant encryption as a condition of doing business, similar to how cybersecurity certifications have become standard requirements in many industries and the federal government.

Related:Is Telecom Security Ready for the Quantum Computing Threat?

Fortifying Your Supply Chain for the Quantum Era

The transition to post-quantum cryptography won't happen overnight. It requires careful planning, testing and implementation across complex systems. Organizations need to begin this journey by:

  • Inventorying their current cryptographic implementations: Organizations must conduct a comprehensive audit of all systems and applications that use cryptographic functions. This includes documenting encryption use cases, digital signatures, authentication mechanisms and cryptographic hash functions, with special attention to systems using RSA and elliptic curve cryptography as these are particularly vulnerable to quantum attacks.

  • Identifying critical data that requires long-term protection: Organizations need to classify their data based on its sensitivity and required protection timeframe, with particular focus on information that must remain secure for a decade or more. This includes intellectual property, personal identification information, healthcare records and strategic data that could retain value well into the quantum computing era. Organizations should also consider data subject to regulatory requirements like HIPAA or GDPR, as these may need additional protection measures during the transition period.

  • Developing transition plans that incorporate these new standards: Organizations should create detailed migration strategies that prioritize critical systems and establish clear timelines for implementation of post-quantum algorithms. These plans must include fallback procedures and hybrid approaches that implement both traditional and post-quantum encryption during the transition period, ensuring continued security while minimizing disruption. The plans should also account for supply chain dependencies and third-party systems that interact with the organization's infrastructure.

  • Testing compatibility with existing systems: Before full deployment, organizations must thoroughly evaluate how post-quantum cryptography affects system performance, network bandwidth and storage requirements, as these algorithms often require more computational resources than current methods. This includes conducting proof-of-concept implementations in controlled environments to identify potential compatibility issues with existing hardware, software and protocols. Organizations should also assess the impact on system latency and user experience, as these factors can affect the successful adoption of new security measures.

  • Training technical teams on the new algorithms: Security teams and developers need comprehensive education on post-quantum cryptography principles, implementation best practices and potential vulnerabilities. This includes practical training on using new cryptographic libraries, understanding key size requirements and managing the increased complexity of post-quantum systems. Teams should also be trained on monitoring and incident response procedures specific to quantum-resistant implementations, ensuring they can effectively maintain and troubleshoot these new security measures.

  • Engaging supply chain partners: Organizations must assess the quantum readiness of their entire partner ecosystem. This includes developing communication protocols for coordinating cryptographic updates with partners, establishing minimum security requirements for vendors, and potentially providing resources to help smaller partners make the transition. Supply chain contracts may need updating to include post-quantum security requirements.

Pioneering Quantum-Resilient Networks

Delivering these standards is a catalyst for transforming supply chain security. Just as the strongest chain is only as strong as its weakest link, tomorrow's quantum-resistant organizations will only be as secure as their most vulnerable supply chain partner.

Organizations that take the lead in adopting these standards will be protecting their own assets, while pioneering a new model of collaborative security. The true measure of success won't be how quickly individual organizations implement these standards but how effectively they unite their entire ecosystem in creating resilient, quantum-resistant networks that protect everyone against tomorrow's threats.

About the Author

Brent Hansen

Vice president of federal sales engineering at Optiv + ClearShark, Optiv + ClearShark

Brent Hansen is the vice president of federal sales engineering at Optiv + ClearShark. He currently leads the direction and strategy for technical guidance to customers, partners, and Federal cyber executives. Brent brings over 25+ years of experience in security, data encryption, cloud-native, Zero Trust, and API security strategies. Brent has previously held global leadership positions at Cequence Security, D2iQ, and was Federal CTO at Thales Trust Cyber Technologies.

Sign Up for the Newsletter
The most up-to-date news and insights into the latest emerging technologies ... delivered right to your inbox!

You May Also Like