Preparing for Post-Quantum Cryptography
This talk explores the threat posed by quantum computing to current public-key cryptography standards and the transition to post-quantum algorithms. It details the risks to existing cryptographic implementations, including RSA, Diffie-Hellman, and Elliptic Curve Cryptography, due to Shor's algorithm and the potential for 'harvest now, decrypt later' attacks. The presentation outlines the NIST post-quantum cryptography standardization process and provides a framework for organizations to assess and migrate their cryptographic assets. It emphasizes the importance of cryptographic agility and avoiding hard-coded algorithms to facilitate future transitions.
Why Your Current Cryptographic Stack is Already Compromised by Future Quantum Threats
TLDR: Quantum computing poses an existential threat to modern public-key infrastructure, specifically through Shor’s algorithm, which renders RSA and Elliptic Curve Cryptography obsolete. Attackers are currently executing "harvest now, decrypt later" campaigns to stockpile encrypted traffic for future exploitation. Organizations must prioritize cryptographic agility and begin transitioning to NIST-standardized post-quantum algorithms to protect long-term sensitive data.
Quantum computing is no longer a theoretical concern for the next century. It is a present-day operational risk. While a cryptographically relevant quantum computer capable of breaking current standards does not exist on your local network today, the threat model has shifted. Adversaries are actively capturing and storing encrypted traffic, banking on the fact that they will eventually possess the hardware to decrypt it. If you are handling data with a multi-year shelf life, that data is already compromised.
The Mechanics of the Collapse
Current public-key cryptography relies on the computational hardness of specific mathematical problems. RSA depends on the difficulty of integer factorization, while Elliptic Curve Cryptography (ECC) relies on the elliptic curve discrete logarithm problem. These are the bedrock of our secure communications, from TLS handshakes to the digital signatures securing the global financial system.
Shor’s algorithm changes the math entirely. It provides a polynomial-time solution for these problems, effectively turning a task that would take classical supercomputers billions of years into one that a sufficiently powerful quantum computer could solve in hours. When this happens, the OWASP Cryptographic Failures category will expand from implementation errors to a fundamental breakdown of the underlying primitives.
The "Harvest Now, Decrypt Later" Reality
Pentesters and researchers often focus on immediate exploitation, but the "harvest now, decrypt later" strategy is a long-game play. By intercepting traffic today, an attacker creates a time-delayed exploit. Once a quantum computer comes online, the attacker can retroactively decrypt years of sensitive communications, intellectual property, or PII.
This is not just about web traffic. Blockchain architectures, which rely heavily on ECC for digital signatures, face a total loss of integrity. If you are auditing a system that uses ECDSA for transaction authorization, you are looking at a system that will eventually be unable to prove ownership or prevent unauthorized transfers.
Assessing Your Cryptographic Debt
Most organizations have no idea where their cryptography is implemented. It is often buried in legacy code, hard-coded into configuration files, or hidden within third-party libraries. To start an assessment, you need to identify your cryptographic assets.
Tools like TruffleHog are excellent for scanning your git history for hard-coded keys, but you also need to audit your network traffic. Use testssl.sh to identify the specific key exchange algorithms and cipher suites your servers are negotiating. If you see RSA or standard Diffie-Hellman, you have a migration path to build.
Building Cryptographic Agility
Hard-coding specific algorithms is a recipe for disaster. If your application logic explicitly requires AES-128-CBC, you cannot update your security posture without a full code deployment. Cryptographic agility is the ability to swap out algorithms without re-architecting the entire system.
Move toward centralized cryptographic services. Instead of having every microservice handle its own encryption, use a service that can be updated globally. When NIST finalizes and updates its Post-Quantum Cryptography (PQC) standards, you want to be able to push a configuration change, not rewrite your entire codebase.
Practical Steps for the Next Engagement
During your next assessment, stop treating encryption as a black box. Ask the development team how they would rotate their root CA if it were compromised by a quantum-capable adversary. If they cannot answer, they are not ready for the post-quantum transition.
Focus your testing on the following areas:
- Key Lengths: While not a solution to quantum threats, increasing key lengths provides a temporary buffer against classical brute force.
- Hybrid Cryptography: Implement hybrid schemes that combine classical algorithms with post-quantum ones. This ensures that even if the PQC algorithm has an undiscovered vulnerability, you still have the classical security layer.
- Dependency Audits: Check your libraries. Are you using OpenSSL 3.2 or newer? Ensure your dependencies are tracking the latest developments in PQC support.
The transition to post-quantum security is a multi-year project. Start by identifying your most sensitive, long-lived data and securing it with hybrid schemes today. The goal is not to achieve perfect security overnight, but to ensure that when the quantum era arrives, your infrastructure is flexible enough to survive the shift.
Vulnerability Classes
Attack Techniques
OWASP Categories
Up Next From This Conference
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

Post-Quantum Panic: When Will the Cracking Begin, and Can We Detect It?




