About This Training
Quantum computing has never been closer to becoming a reality, and with it Y2Q, when quantum computers become weaponized by threat actors. Y2Q threatens to render many widely used cryptography solutions useless.
This is an urgent problem for manufacturers of products that will last 5 or more years. Design decisions made now will likely live past Y2Q, and therefore need to consider how security can be maintained post quantum.
Based on BlackBerry’s Certicom technology, the Quantum Resistant Code Signing Server combined with the NXP’s S32G2 chip’s secure boot flow, we present a fast and agile quantum protected demonstrator. Using quantum resistant signature schemes such as Dilithium for low level device firmware, over the air software updates and software bills of material (SBOMs) mitigates the risk of potential quantum computing attacks on critical software updates; something which addresses a major security concern for industries like healthcare, transportation, aerospace and defense that rely on assets that will be in use for a long time.