To explore America’s “transition to a post-quantum world,” the Washington Post interviewed U.S. federal official Nick Polk, who is focused on national security issues including quantum computing and is also a senior advisor to a White House federal chief information security officer):
The Washington Post: The U.S. is in the early stages of a major shift focused on bolstering government network defenses, pushing federal agencies to adopt a new encryption standard known as post-quantum cryptography that aims to prevent systems from being vulnerable to advanced decryption techniques enabled by quantum computers in the near future…
Nick Polk: We’ve been using asymmetric encryption for a very long time now, and it’s been ubiquitous since about 2014, when the U.S. government and some of the large tech companies decided that they’re going to make it a default on most web browsers… Interestingly enough, regarding the post-quantum cryptographic standards being developed, the only thing that’s quantum about them is that it has “quantum” in the name. It’s really just a different type of math that’s much more difficult for a quantum computer to be able to reverse-engineer. The National Institute of Standards and Technology is looking at different mathematical models to cover all their bases. The interesting thing is that these post-quantum standards are actually being used to protect classical computers that we have now, like laptops…
Given the breadth of the U.S. government and the amount of computing power we use, we really see ourselves and our role as a steward of the tech ecosystem. One of the things that came out of [this week’s Inside Quantum Technology conference in New York City] was that we are very quickly moving along with the private sector to migrate to post-quantum cryptography. I think you’re gonna see very shortly a lot of very sensitive private sector industries start to migrate or start to advertise that they’re going to migrate. Banks are a perfect example. That means meeting with vendors regularly, and testing their algorithms to ensure that we can accurately and effectively implement them on federal systems…
The administration and national security memorandum set 2035 as our deadline as a government to migrate our [national security] systems to post-quantum cryptography. That’s supposed to time with the development of operational quantum computers. We need to ensure that we start now, so that we don’t end up not meeting the deadline before computers are operational… This is a prioritized migration for the U.S. government. We’re going to start with our most critical systems — that includes what we call high-value assets, and high-impact systems. So for example, we’re gonna prioritize systems that have personal health information.
That’s our biggest emphasis — both when we talk to private industry and when we encourage agencies when they talk to their contractors and vendors — to really think about where your most sensitive data is and then prioritize those systems for migration.