Yes, we can! – Post Quantum Signatures for Credentials

Quantum computing poses risks to current cryptography. Procivis offers solutions using post-quantum cryptography to secure digital identities and verifiable credentials.

Should you worry?

Quantum computing and its impact on IT security, encrypted communication and digital signatures are frequently discussed in the media. Panic quickly spreads, because quantum computing has potentially disastrous consequences for the very technology on which our current IT security architecture is based, secure cryptography.  

To understand this topic properly without panicking unnecessarily, it is necessary to delve a little deeper into the world of cryptography and understand what needs to change to make cryptography secure despite new quantum computers.  

This will be a little more detailed, but don't worry, it will remain understandable.

In a nutshell: We at Procivis have already dealt with this topic in detail and developed a solution that our customers can already use today to make their identity management post-quantum secure.  

What is the difference between symmetric and asymmetric cryptographic methods? And why is this important?  

In cryptography, which is used to encrypt messages, a distinction is made between symmetric and asymmetric methods.  

 In symmetric procedures the parties that encrypt and decrypt a message use the same information, i.e. the same key. This enables high performance, as is the case with AES encryption or hash functions, for example. However, the disadvantage is that the key must be distributed securely, which represents a significant security risk.  

The solution to this problem was found with the introduction of asymmetric encryption in 1976 with the RSA algorithm. Here, the party encrypting a message uses a public key, while the recipient has a private key to decrypt the message. Asymmetric algorithms consist of a key pair - a public and a private key, whereby the public key can be shared, but the private key remains secret and therefore does not have to be shared with anyone.  

Why are asymmetric methods threatened by quantum computing?   

Asymmetric methods work with a trapdoor function (that is easy to compute in one direction, but almost impossible to compute in the opposite direction), this way it is easy to calculate a public key from a private key. However, the reverse process of calculating the private key based on knowing only the public key is extremely complex with today's computing technology. Quantum computers could theoretically simplify and solve these difficult calculations with ease and thus threaten the security of the underlying private keys. Popular asymmetric methods such as RSA and Eliptic Curve are therefore at risk from quantum computers, causing a risk not just for current operations, but for past operations where a public key was shared in the past.  

What can be done about this?   

On the one hand, the security of existing procedures can be increased, larger prime numbers can be used in the RSA procedure, or procedures can be used that are immune to the advantages of quantum computers. Both are already possible today but are associated with disadvantages. On the one hand, performance suffers and on the other, new methods must be developed. New methods are not popular in applied cryptography, as security must first be proven theoretically and mathematically, and there is always a risk of errors creeping in during implementation. This is why people tend to rely on tried and tested encryption algorithms.  

What are the current implications?  

For now, we don't see any danger for conventional methods, as quantum computers are still a few steps away from a computer with sufficient performance. However, surprises and rapid leaps in development cannot be ruled out. The second aspect concerns the availability of such systems and the economic cost of cracking encryption.

Current effects and long-term considerations  

In the long term (5-30 years) there may well be an impact. If the encrypted data traffic is already stored by one party now, it would be possible to decrypt it in the future. Nobody can say exactly when this future will be. However, this is also a well-known paradigm in the history of cryptography. Encryption is only secure for a limited time and this time is difficult to estimate.  

What does this mean for digital identities and verifiable credentials?   

If conventional signature methods are no longer secure, all previously issued digital identities and credentials would have to be reissued. This could have a significant impact on a country's digital identity, especially as government processes become increasingly digitized.

What have we done?  

To address these challenges, we have already implemented a process that was selected by NIST as part of a selection process that has been running since 2017. Our customers already have the option of signing and validating their digital proofs and identities (verifiable credentials) using post-quantum cryptography. This ensures that even credentials issued today will be secure in the future of quantum computers and can no longer be decrypted retroactively.  


If you want to use this new quantum-safe technology, just get in touch with us directly. Our team is looking forward to more exciting projects and partners.

This article is based on the original post of Andreas Freitag on LinkedIn.

Find out how you can benefit from our software solutions

We are happy to show you how you how to integrate our customized and modular solution.