Why banks need to plan beyond post-quantum encryption

Inauguration Of An IBM Quantum System One Quantum Computer
An IBM quantum computer during a 2023 inauguration event.
Andrej Ivanov/Bloomberg

Last week, a cybersecurity-focused trade group for the financial services industry released a whitepaper advocating for banks and other institutions to adopt an agility around encryption standards, so they can switch algorithms as needed if current standards are ever broken or weakened.

The group, the Financial Services Information and Sharing Center, or FS-ISAC, promoted this so-called "cryptographic agility" — an idea that's existed for two decades — not only because banks now face the prospect of adopting one set of new encryption standards that can resist attacks from quantum computers, but because this is not the first time they have had to adapt. And, many expect, it will not be the last.

"The financial services industry must take a leadership position in cryptographic agility, ensuring the sanctity and safety of data and storage as threats continue to evolve," said Michael Silverman, chief strategy and innovation officer at FS-ISAC.

The whitepaper, titled Building Cryptographic Agility in the Financial Sector, follows an announcement in August by the National Institute of Standards and Technology, or NIST, that finalized three new cryptography standards that are designed to resist attacks from quantum computers. It also comes after G7 cyber experts, led by the U.S. Department of the Treasury and Bank of England, released a statement last month highlighting the potential risks quantum computers introduce, including against today's encryption algorithms.

The idea of the whitepaper, Silverman said, is to enable business continuity even when existing cryptography — like the algorithms that NIST is looking to replace — is compromised or weakened.

One of the new NIST standards, FIPS 203, would replace the widely used RSA encryption algorithm with a quantum-proof replacement algorithm, which it calls the Module-Lattice-Based Key-Encapsulation Mechanism, or ML-KEM. While no quantum computer exists today that can break the most commonly used versions of RSA, many experts believe it is only a matter of time before it is rendered obsolete.

Ever-changing encryption standards

Experts have said, even before NIST finalized its new cryptography standards, that the urgency in deploying quantum-resistant cryptography lies less with immediate challenges, such as transitioning to ML-KEM in the next year, and more with the longer-term challenge of developing an agile approach to cryptography. That might involve, for example, replacing ML-KEM in the future with some even newer alternative.

If the history of cryptography is any indication, the transition to using ML-KEM and the two other algorithms NIST finalized will not be the last. Indeed, NIST has acknowledged the need for a backup algorithm that could replace ML-KEM if it is ever broken. In its announcement in August, NIST said it planned to release a second class of post-quantum cryptography algorithms by the end of the year.

As FS-ISAC outlined in its report, there have been multiple changes to cryptography standards as banking has gone digital. In 1977, NIST finalized its Data Encryption Standard, or DES, and while known today to be insecure, it proved influential across industry and academia at the time, not least in financial services, where banks dropped the proprietary algorithms they were using in favor of NIST's recommendations.

Since then, NIST has been at the forefront of many standards changes. In 2001, NIST published its Advanced Encryption Standard, or AES, as the next-generation follow-up to DES (and the closely related Triple DES).

Increases in computing capacity have required banks and other companies to continuously adopt newer versions of the popular RSA encryption algorithm, to support larger keys that have become harder to break over time. This might also prove true of ML-KEM.

In the realm of hashes — algorithms designed to protect passwords — the early 2000s brought a transition away from MD5 to SHA-1, a standard published by NIST in 1995, after flaws were found in the old algorithm. In 2017, Google then identified weaknesses in SHA-1, which prompted NIST to recommend a transition to SHA-3, which it had standardized two years prior and remains the standard today.

The new 'cryptographic agility' mandate

This history of cryptographic transitions and the growing complexity of transition efforts, as systems and hardware proliferate, have prompted FS-ISAC to recommend a more holistic approach it calls cryptographic agility.

"Cryptographic agility is a measure of an organization's ability to adapt cryptographic solutions or algorithms (including their parameters and keys) quickly and efficiently in response to developments in cryptanalysis, emerging threats, technological advances and/or vulnerabilities," reads the FS-ISAC report.

To put it another way, FS-ISAC also calls cryptographic agility a "design principle" for enabling quick cryptography-related changes with minimal disruption to business operations.

FS-ISAC's 26-page paper provides an eight-step framework for replacing insecure algorithms, involving taking inventory of the types of algorithms an institution uses and where; planning how to replace those algorithms; testing and validating their replacements; and so on, until the next inventory phase begins.

The paper also outlines nine core elements of a successful crypto agility transition, a five-stage maturity model for assessing the organization's level of crypto agility, and the pros and cons of the many technical details of how an organization can prepare to replace an insecure cryptographic algorithm.

As one example, the paper assesses crypto-as-a-service, a design pattern in which an organization maintains its encryption algorithms in applications that are totally separate from the applications that use them. This separation creates a so-called "magic curtain" that allows the organization to swap the cryptography system as needed.

One downside of a crypto-as-a-service system is the latency it might introduce. Sending requests to a different application or process could add milliseconds to a decryption or encryption operation that would quickly add up to higher computational costs over time. The FS-ISAC paper explores these technical details, as well as the broader view of why these considerations matter.

"This paper is an extraordinary collaboration, combining the knowledge and experience of more than 30 quantum and security subject matter experts from the financial services sector, into a single artifact for both business and technical audiences," said Peter Bordow, the chair of the FS-ISAC working group that produced the paper and managing director of quantum security at Wells Fargo.

For reprint and licensing requests for this article, click here.
Cyber security Encryption Technology
MORE FROM AMERICAN BANKER