Cryptographic Agility's Legislative Possibilities & Business BenefitsCryptographic Agility's Legislative Possibilities & Business Benefits

Quantum computing will bring new security risks. Both professionals and legislators need to use this time to prepare.

Keavy Murphy, Cybersecurity Specialist

January 28, 2025

4 Min Read
Jigsaw puzzle with black background; the pieces have combination locks on them
Source: Sergey Tarasov via Alamy Stock Photo

COMMENTARY

One of cybersecurity's major pitfalls is assuming that risks will always stay the same. Failing to consider emerging threats has caused detriment in the security field. When varied threats already exist that are time-tested and successful, like ransomware, phishing, or business email compromise, security professionals often don't consider that new risks arise daily. 

Quantum computing and the potential for cracked algorithms are among the first instances where security professionals have a heads-up on an emerging trend. As a result, both professionals and legislators can use this time to their advantage and prepare by putting forth maximum effort to approach cryptographic agility. This model is defined as the ability for technology to seamlessly switch to new protocols or mechanisms when algorithms become insecure (without system interruption).

The Possibility of Cryptographic Agility Adoption

A critical question that has emerged as quantum computing and algorithm cracking approaches is whether cryptographic agility is genuinely possible for the average tech company. 

Quantum computing is not a new concept, and new cryptographic algorithms to prepare for that hypothesis have been developing progressively since 2016 (note the National Institute of Standards and Technology's call for new algorithms — three of which were published last fall). Yet the United States is far from documenting robust legislation to mandate cryptographic agility in the US market. 

Unfortunately, this puts the data stored on US soil at risk, leaving US businesses to fend for themselves. Small players within the US may be at the mercy of legislation and large tech companies to pave the way for cryptographic agility (such as through the Shared Responsibility Model). 

NIST has done a solid job of widely distributing the three new encryption standards it has published (ML-KEM, ML-DSA, and SLH-DSA). Still, proper enforcement may only be possible at the federal level, which is required to make cryptographic agility a widespread practice in security departments.

Cryptographic Agility: A Legislative Necessity 

One reliable way to plan for any emerging threat, including quantum computing that could crack standard algorithms, is to look to the courts. US security professionals and tech businesses should consistently look toward Europe, since its cybersecurity legislation is often further ahead and more mature. 

Two examples are the emerging NIS and DORA regulations, which strongly emphasize cryptographic agility as a security best practice. Though these sweeping directives were enacted outside US borders, they provide a framework America could use to build its quantum computing legislation. 

A significant challenge regarding quantum computing and the cracking of standard algorithms is that we know it is coming — though not precisely when. The field lacks detail on how soon key cracking and invalidation will occur (though heavily debated, news articles emerged last fall indicating that Chinese agencies had cracked reputable algorithms — some argue the risk is coming sooner than 2030). 

This uncertainty underscores the strong benefit legislation would provide ahead of the arrival of quantum computing.

The Business Benefit of Cryptographic Agility

Implementing a cryptographic agility model has benefits beyond data security and privacy protection. This adoption also has significant business benefits.

Cryptographic agility is a strategic move for a company. Preparing before quantum computing fully emerges is an opportunity to positively contribute to a company's bottom line, because cryptographic agility could be an organization's market differentiator. With so few businesses embracing this best practice, implementing it today would present a distinct competitive advantage. Security and safety are not the only motivators for implementing a cryptographic agile program. 

The Time to Prepare With Cryptographic Legislation Is Now

A quantum computing risk assessment is challenging to conduct because no professional in the security space has been able to identify, with precision, how many years it will take until an algorithm like AES-256 (a popular symmetric model which is often the topic during encryption resiliency debates) is found to have flaws. Instead, the field has relied on very vague definitions and estimates, ranging from 10 years to 30 years down the road. Industries and legislators are postponing the goal of becoming cryptographically agile by decades, using both excuses that "we have time" and "we do not know when this risk will be realized." Nevertheless, the time to prepare with cryptographic agile legislation is now — and even without it, businesses that adopt the model have a distinct competitive advantage.

The cybersecurity field is fortunate to have adequate notice; they must prepare before quantum computing emerges and alters the trusted algorithms technology has relied on.

About the Author

Keavy Murphy

Cybersecurity Specialist

Keavy Murphy is a Boston-based security professional. Passionate about cybersecurity, especially for new and emerging companies, she prioritizes using soft skills to manage compliance and risk management effectively in parallel with business objectives. Previously, she served in information security roles at Starburst Data, Cambridge Mobile Telematics, Alegeus and State Street. She enjoys writing about and researching the benefits of effective communication within the security space. Her work has been published in Dark Reading and Info Security Magazine and presented at seminars including the Chief Data and Analytics Officers Conference and FutureCon. She is an active volunteer with Boston Cares, has served in the ISACA Engage Mentor program, and holds both CIPP and CIPM certifications.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights