Quantum Threats Are
Closer Than You Think!
Dr. Frank LEYMANN - WSO2 Technical Fellow
Isabelle MAUNY - Field CTO
2
Q-DAY is getting closer!
MFA or not MFA : is this
3
Why Should You
Worry NOW ?
4
What should you care ?
5
Harvest now, decrypt later
If (Retention Period + Action time) > T
Your data might already be compromised
6
Quantum 101 : the power of a single quantum bit
0
1
Bit Qubit
|0⟩
|1⟩
7
Quantum 101: The Power of a Quantum Register
n qubits ⇒ superposition of values at the same time
#atoms in universe ≤ ↦ n=300 Qbits
Quantum Parallelism
…
|0⟩
|1⟩
|0⟩
|1⟩
|0⟩
|1⟩
|0⟩
|1⟩
Why are quantum computers good at cracking RSA?
● With RSA, the private key is the product of two large prime numbers
● Computing factors of N can be reduced to determine period of function
● i.e. compute the "discrete logarithm”
● A quantum computer could derive the private key from the public key!
● Other algorithms like ECC could also be cracked.
8
Crypto-Relevant
Quantum computer
9
Lattice-Based Crypto to the rescue…
"Learning with Errors"
NIST Standards: ML-KEM (Kyber), ML_DSA (Dilithium)
10
Dual Algorithms approach
● Post-quantum algorithms (Q) are gradually gaining prominence but require time to
establish trust within the industry
● Need for dual approach
11
Using Hybrid Key Encryption
● Combines the conventional RSA-KEM with the post-quantum ML-KEM-768
(approved by NIST)
● Allows you to start to be prepared now!
12
All algorithms are Open Source!
13
Quantum-resistant doesn't mean slow!
14
ML-KEM is the clear winner for performance vs. security ratio!
15
16
17
Regulations
NIS2
CSF 2.0
WSO2 and Post Quantum Support
● The Ballerina language is post quantum ready !
● Supports signatures and encryption using combined standard and PQC
algorithms
● WSO2 Identity Server also supports Post Quantum algorithms
● More to come!
18
wso2.com
Thanks!
References
● WSO2 Quantum page
● https://wso2.com/post-quantum-security/
● Industry references
● https://techstrong.it/featured/quantum-computing-can-break-rsa-with-fewe
r-qubits-than-previously-known/
● Regulations
● NIST PQC standards:
https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-final
ized-post-quantum-encryption-standards
● NIS2 Regulation: https://digital-strategy.ec.europa.eu/en/policies/nis2-directive 20

Quantum Threats Are Closer Than You Think – Act Now to Stay Secure

  • 1.
    Quantum Threats Are CloserThan You Think! Dr. Frank LEYMANN - WSO2 Technical Fellow Isabelle MAUNY - Field CTO
  • 2.
  • 3.
    MFA or notMFA : is this 3 Why Should You Worry NOW ?
  • 4.
  • 5.
    5 Harvest now, decryptlater If (Retention Period + Action time) > T Your data might already be compromised
  • 6.
    6 Quantum 101 :the power of a single quantum bit 0 1 Bit Qubit |0⟩ |1⟩
  • 7.
    7 Quantum 101: ThePower of a Quantum Register n qubits ⇒ superposition of values at the same time #atoms in universe ≤ ↦ n=300 Qbits Quantum Parallelism … |0⟩ |1⟩ |0⟩ |1⟩ |0⟩ |1⟩ |0⟩ |1⟩
  • 8.
    Why are quantumcomputers good at cracking RSA? ● With RSA, the private key is the product of two large prime numbers ● Computing factors of N can be reduced to determine period of function ● i.e. compute the "discrete logarithm” ● A quantum computer could derive the private key from the public key! ● Other algorithms like ECC could also be cracked. 8 Crypto-Relevant Quantum computer
  • 9.
    9 Lattice-Based Crypto tothe rescue… "Learning with Errors" NIST Standards: ML-KEM (Kyber), ML_DSA (Dilithium)
  • 10.
    10 Dual Algorithms approach ●Post-quantum algorithms (Q) are gradually gaining prominence but require time to establish trust within the industry ● Need for dual approach
  • 11.
    11 Using Hybrid KeyEncryption ● Combines the conventional RSA-KEM with the post-quantum ML-KEM-768 (approved by NIST) ● Allows you to start to be prepared now!
  • 12.
  • 13.
  • 14.
    14 ML-KEM is theclear winner for performance vs. security ratio!
  • 15.
  • 16.
  • 17.
  • 18.
    WSO2 and PostQuantum Support ● The Ballerina language is post quantum ready ! ● Supports signatures and encryption using combined standard and PQC algorithms ● WSO2 Identity Server also supports Post Quantum algorithms ● More to come! 18
  • 19.
  • 20.
    References ● WSO2 Quantumpage ● https://wso2.com/post-quantum-security/ ● Industry references ● https://techstrong.it/featured/quantum-computing-can-break-rsa-with-fewe r-qubits-than-previously-known/ ● Regulations ● NIST PQC standards: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-final ized-post-quantum-encryption-standards ● NIS2 Regulation: https://digital-strategy.ec.europa.eu/en/policies/nis2-directive 20