It's Time to Prepare for Quantum Computing’s Impact on DNS Security

Mainstream quantum computing may still be years away, but cybersecurity efforts to protect against quantum attacks can’t wait. When quantum computing does make its entrance, it could quickly eviscerate the cryptography that currently protects online communications, such as the digital signatures used in the domain name system (DNS) and the key exchanges used in transport layer security (TLS).  

Fortunately, efforts to protect against how quantum computers could be used in cyberattacks have been underway for years. The National Institute of Standards and Technology (NIST) launched its post-quantum cryptography program in 2016, and in July selected the initial group of algorithms eligible for standardization. But the industry needs to prepare now because updating systems for quantum capabilities will have its challenges.

The quantum threat to DNS

DNS manages the flow of traffic on the internet. And the cryptography used in DNS Security Extensions (DNSSEC) is essential to the safe routing of traffic, using digital signatures or symmetric keys to verify that websites and data are what they purport to be. Strong cryptography is the only way to ensure that users can trust the results.

Today’s current level of cryptography works well, rendering data as a random sequence of bytes that are useless to anyone without a key. However, quantum computing will change that with processing power which will make current cryptography obsolete.  

The quantum bits, or qubits, used in quantum computing work in a different, much faster way than the binary bits used in traditional computing, enabling quantum machines to not only code information more quickly but also to store information immediately. Attackers would be able to access data, store and decrypt it later — and decrypt it much more easily with the power of quantum computing. Encrypted data will likely not stay encrypted for as long as intended.

Quantum computing also will present challenges to DNS’ capacity to handle traffic, because of...

Search
  • There are no suggestions because the search field is empty.
Latest posts
Podcast Appearance: Facing Cyberthreats and Misinfo in a Tense Political Climate Podcast Appearance: Facing Cyberthreats and Misinfo in a Tense Political Climate

In this episode of DOS Won’t Hunt, Eric Wenger, senior director for cyber and emerging tech policy with Cisco; Roman Arutyunov, co-founder and senior vice president of products with Xage Security; Dennis Dayman, CISO with Code42; TK Keanini, CTO with DNSFilter; and Akash Agarwal, director of engineering and DevSecOps with LambdaTest, discuss ways to address possible cyber threats and misinformation in the workplace during this intensely partisan ...

Public Wi-Fi is table stakes, and unsecured Wi-Fi is risky business Public Wi-Fi is table stakes, and unsecured Wi-Fi is risky business

While public Wi-FI can be very convenient, both for users and providers, it also introduces a number of security challenges. Unsecured or under-secured public Wi-Fi networks can expose users to cyber threats like identity theft, financial fraud and data breaches. Once they are connected, attackers can monitor all traffic, extract sensitive data, and even inject and spread malware.

CIO Influence Interview with TK Keanini, CTO of DNSFilter CIO Influence Interview with TK Keanini, CTO of DNSFilter

TK is a leader in technical innovation, specializing in the identification and protection of intellectual properties. With a background in game development and information security, he balances design’s social and technical aspects. Known for his ability to acquire top talent and build high-performing teams at DNSFilter.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.