• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
    • AS4
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
    • Blog
    • Newsletter Subscription
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

A quantum-safe future with crypto-agility

Stefan Feist | Technischer Redakteur
Author: Stefan FeistTechnical Writerhttps://www.linkedin.com/in/stefan-feist-23b257b0/–Connect on LinkedIn

In our article on post-quantum cryptography and email security, we highlighted the dangers that current and upcoming developments in the field of quantum computing pose for the security of IT systems. Many experts cite crypto-agility as a central component of a quantum-safe security strategy. But what exactly is crypto-agility?

21.03.2024|Last edited:20.03.2024

Quantum computers threaten today’s cryptographic systems

Today’s cryptographic systems are under threat because quantum computers will be able to break current public key procedures in the future. The presentation of the Shor algorithm in 1994 showed that asymmetric encryption can be broken.

The development of a quantum computer on which Shor’s algorithm can be implemented “appropriately” would therefore render asymmetric cryptography useless. Symmetric cryptosystems are threatened by quantum computers that use the Grover algorithm.

Further threats to cryptography

The Fraunhofer Institute for Secure Information Technology SIT speaks of four threats to cryptography in connection with cryptoagility:

  • Increase in computing power

    Solution: The (encryption) keys are getting longer, so it would take too long to break them even with better computing power.

  • Protocol and implementation errors

    Solution: Install patches and updates. Keep all software up to date and use the latest standards.

  • Mathematical advances

    Solution: If such an attack becomes known, you should switch directly to a cryptographic method based on other mathematical problems.

  • Quantum computers

    Solution: New cryptographic methods that can also withstand an attack by a quantum computer, see post-quantum cryptography.

The BSI explains that crypto-agility can be achieved as follows:

“In the new and further development of applications, particular attention should be paid to making the cryptographic mechanisms as flexible as possible in order to be able to react to all conceivable developments, implement upcoming recommendations and standards and possibly replace algorithms in the future that no longer guarantee the desired level of security.”

The BSI refers to Marian Margraf from the Free University of Berlin, who focuses on organisational aspects by calling for adequate migration concepts and incident management systems.

How do you become crypto-agile?

These organisational aspects are a central component of crypto-agility. If crypto-agility is defined as the ability of a system or organisation to flexibly adapt the cryptography used and thus react quickly to vulnerabilities, then this process has an organisational aspect in addition to the purely technical one, which makes it possible to implement technical developments.

In other words, it must be possible to replace or update the cryptographic procedures quickly and easily. So we are no longer just talking about the race between the most secure encryption algorithms and the most effective attacks on them, but also about anticipating new technologies and reacting to them as flexibly as possible.

Crypto-agility can be implemented at various levels. Several measures can complement or replace each other, be it flexible hardware, individual interchangeable functions or entire cipher suites, i.e. cryptographic processes that build on each other. However, making everything more flexible does not make sense either, as more crypto-agility makes systems more complex and therefore often slower.

Requirements for cryptoagility

According to the Fraunhofer Institute, cryptoagility always requires the fulfilment of the following requirements:

  • Knowledge about crypto-agility is present

    Goal: informed crypto decisions.

  • System knowledge is present, responsibilities, access and crypto algorithms are known and documented.

    Goal: cryptographic capability in your own system.

  • Processes are agile, a central committee makes IT security decisions based on guidelines, e.g. from the BSI.

    Goal: agile action in cryptography.

  • The system is agile, modular hardware makes it easy to replace components.

    Goal: sufficient capacities for quantum-resistant processes.

  • Modular software for algorithms, making it easy to replace individual components.

    Goal: flexible use of various cryptographic algorithms.

Crypto-agility should already be an important part of companies’ security strategies today. Although the starting point is often the threat to IT security posed by quantum computers, an agile strategy is also effective for classic attacks using “conventional” computers: these attacks can also evolve and break encryption methods and render them useless. Investing in crypto-agility is worthwhile in any case, because it means preparing today for future attacks, regardless of whether they are quantum-based or not.

Not yet using NoSpamProxy?

With NoSpamProxy you can reliably protect your company from cyber attacks. Request your free trial version now!

Get your free NoSpamProxy trial now!
  • share 
  • share 
  • share 
  • email 

SEARCH

PRODUCT

  • All Topics
  • NoSpamProxy Cloud
  • NoSpamProxy Protection
  • NoSpamProxy Encryption
  • NospamProxy Large Files

You need support?

You can find more information about NoSpamProxy in our documentation and forum.

CATEGORY

  • All Topics
  • News
  • Product
  • Tech & Support
  • Events

NoSpamProxy Newsletter

Subscribe to Newsletter
RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

NoSpamProxy

  • NoSpamProxy Cloud
  • NoSpamProxy Encryption
  • NoSpamProxy Large Files
  • NoSpamProxy Disclaimer
  • Price request
  • Team
  • Career
  • General terms and conditions
  • Data Protection Information for Business Partners and Applicants
  • Cybersecurity (PSIRT)

Partners

  • Becoming a reseller
  • Partners
  • Order Certificates
  • Newsletter

Categories

  • All topics
  • News
  • Support
  • Updates
  • Order certificates

Latest News

  • Warum Sie ARC in NoSpamProxy jetzt aktivieren sollten Preview
    Why you should activate ARC in NoSpamProxy now11.07.2025 - 12:08
  • SVG files in email attachments: Danger by malicious code preview
    Attached SVG file: Danger from malicious code04.07.2025 - 10:00
  • NoSpamProxy Update
    NoSpamProxy Cloud June update: Rollout started30.06.2025 - 06:00
IMPRINT • EULA • Privacy Policy • • © 2025 Net at Work GmbH
  • Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
Link to: Content filter and Disclaimer: a smart combination Link to: Content filter and Disclaimer: a smart combination Content filter and Disclaimer: a smart combinationNoSpamProxy Tipps & Tricks Preview Link to: The 32Guards Sandbox, or: Tales from the sandbox Link to: The 32Guards Sandbox, or: Tales from the sandbox 32Guards Sandbox PreviewThe 32Guards Sandbox, or: Tales from the sandbox
Scroll to top Scroll to top Scroll to top