Picture this: a quantum computer exists which can handle complex problems that are practically unsolvable for today’s computers as the calculations would take centuries. Which contributes to new products and services. Which has the potential to help in the development of personal medicines. However, we also need answers regarding the security risks of the quantum age. This is why it’s crucial to secure information against attacks that use a quantum computer. TNO can help companies to make networks quantum-safe and to solve legacy problems. The quantum-safe VPN connection (Virtual Private Network) is an example of this.
Go straight to information on:
Quantum-safe Crypto
Cryptography is widely used to shield information from unauthorised access. This has been successful because even the fastest computers would take hundreds to millions of years to decipher encrypted information. With the advent of the quantum computer, however, this will change.
Although it will take some time before a quantum computer that can crack cryptography actually exists, it’s important to take action now. All encrypted information which is currently being communicated or stored can be saved for later cracking by a quantum computer. To ensure that confidential information remains secure for a long time, it is important to develop cryptosystems that can withstand attacks from both the current computer and the quantum computer: so-called post-quantum cryptography or quantum-safe cryptography.
How to make your organisation Quantum-safe
Find out which steps you need to take
Solving legacy problems
Organisations have many software applications running, which often results in a lack of a complete overview. In addition, old systems – so-called legacy systems – are still in use far beyond their expected lifespans and are used to support important, critical and often large-scale ICT processes. This legacy of systems puts a damper on innovation and poses an ever-increasing risk to stability and reliability. To solve this legacy problem, untangle the chaos and make the network quantum-safe, a smart solution is needed.
Where do you start untangling?
The advent of the quantum computer and existing legacy problems create challenges for companies. One often no longer knows what’s going on within the company network and it’s difficult to determine if the most recent version of cryptography is being used everywhere. Figuring this out and then re-securing your systems is a huge task. Where should you start? With the inventory – and TNO can help with this.
Tool: advanced security proxy
The Advanced Security Proxy (ASP) not only helps to make an inventory of the security of software systems in use but can also be a guarantor of secure traffic. The ASP can be used to make organisations quantum-safe. The tool – which can make efficient use of programmable hardware – can provide insights into legacy problems while mitigating security risks through the quantum-safe encryption of data exchanges. The ASP can improve the security of older systems without reworking the older systems themselves. You could compare this to a smart VPN connection, but in this case the ASP is an element between the network and the internet which is capable of monitoring all connections to the internet.
The ASP quickly performs deep packet inspection on (potentially encrypted) communication channels using programmable hardware. The tool performs various gateway functionalities, such as monitoring the security level of the cryptography in use and upgrading the cryptography to set up more secure channels that traverse less secure networks, such as the internet. By upgrading the encryption used, the ASP protects older devices that cannot do this independently. If you want to know more about how the ASP works, you can read further here.
The advantages of asp: cheaper and simpler
The ASP protects older network systems against current security threats without requiring the organisation concerned to directly invest in major network updates. This is a much cheaper solution as the implementation costs of the ASP are low. Furthermore, there is no need to update the entire security portfolio when the ASP is implemented. The tool is a natural addition to your current security portfolio. The ASP can therefore save the Dutch business community a lot of costs, especially for organisations with an extensive network infrastructure.
The ASP is a multifaceted system. It can be added to an existing security portfolio as a passive or active element or a combination of both, depending on the desired functionality. As a passive element, it can serve as a lifelong crypto-inspector. As an active element, the ASP can be used to increase the security of legacy systems. Interested in the ASP? Please contact Maran van Heesch.
Tool: Quantum-Safe VPN
VPN connections are often used to give people who work from home access to their employer’s internal network, for example. With the help of a VPN connection, a secure connection can be made to the employer’s network over the home network’s internet. VPN connections make use of an encrypted connection. The cryptography used for this is not quantum-safe and therefore carries a security risk. The data sent over the VPN connection are currently not protected against attacks by a quantum computer.
Post-quantum cryptography can be used to make VPN connections quantum-safe. At TNO, we have tested this with OpenVPN. There are different types of post-quantum cryptography, each with different properties. Through our tests, we have made it clear that some types of cryptography require more bandwidth while others require more computing power. It is important to investigate the impact that post-quantum cryptography will have and which type is most suitable for different security products.
Another example of a security product which is affected by the quantum computer is the public key infrastructure (PKI), which is widely used for digital authentication. The migration to quantum-safe PKI is more complex than the migration to quantum-safe VPN, both from a technical and governance perspective.
Collaboration
Within TNO, there is a strong foundation of applied cryptographic knowledge and a lot of expertise in the fields of internet, communication networks and cybersecurity. This unique combination enables us to oversee the impact of post-quantum cryptography and to advise and guide organisations in the transition process for their information security.
Would you like to know more about what TNO is doing in the field of quantum-safe cryptography?
Please contact Maran van Heesch
More tech? Smarter Cybersecurity!
Picture this: autonomous vehicles that only make secure connections to their environment; always receiving the best treatment in hospital while your privacy is guaranteed; carefree online business in which... Read moreOptimising care by encrypting patient data
Healthcare costs in the Netherlands amount to 100 billion euros annually (10% of GDP) and are expected to rise to over 170 billion euros by 2040. It is essential to continue improving care and to keep... Read moreCybersecurity for complex networks
Self-driving cars can no longer be viewed as a single system. These are cars with complex computer systems that independently make countless connections with the driver, with other vehicles, with the... Read moreCarefree entrepreneurship thanks to security monitoring and detection
Technology, data and data-driven solutions are becoming increasingly important to the functioning of our society. The Netherlands is experiencing rapidly growing digitalisation in terms of processes... Read moreFuture quantum computers could offer possibilities for cancer detection
Quantum technology is seen as a key technology that will enable new products and services. Together with TU Delft, TNO is working within QuTech on the computer of the future: the quantum computer. Quantum... Read moreThe Digital Resilience of The Netherlands
Our Dutch defence and security organisations, including the national police and the NCTV, are jointly responsible for our national security – including in the digital domain. In addition to the sea, land,... Read more
- Artificial Intelligence
- Application areas
- Use cases
- Program line 1: Safe autonomous systems in an open world
- Program line 2: Responsible human-machine interaction
- Secure learning in money laundering detection
- Fair decision making in the job market
- Secure learning in diabetes-2 advice
- Diagnosing for printer maintenance
- Subsidence monitoring
- Fair decision making in justice
- Augmented worker for smart industry
- Energy balancing for smart homes
- Secure learning in oncology research
- Innovation monitoring in policy
- News
- Defence, Safety & Security
- Roadmaps
- Operations & Human Factors
- Climate Chambers for Research into Human Performance
- Desdemona: the next generation in movement simulation
- LT Lab: the TNO learning technology laboratory
- Performance and health monitoring
- Motion sickness and performance
- The neurobiology of Stress
- NetForce Command: an alternative to hierarchical command and control
- Operational military performance in a virtual world
- SUPRA
- Simulation Live Virtual and Constructive
- Concept Development & Experimentation
- IAMD: Integrated Air & Missile Defence
- JROADS
- FACSIM
- Helicopter studies
- Replacement of the F-16
- MARVEL / Comprehensive Approach
- TNO ACE: Advanced CD&E Environment
- Integrated approach to Dutch Royal Navy patrol ships
- Operational analysis during military operations
- SketchaWorld: from sketch to virtual world
- Camouflage
- Information & Sensor Systems
- Digital Resilience of The Netherlands
- LFAS - Low Frequency Active Sonar
- Tanker Remote Vision System
- Platform signatures
- TNO shapes the future of MMICs and RFICs
- CARPET: Computer-Aided Radar Performance Evaluation Tool
- Underwater Warfare and Security
- Wide Area Motion Imagery WAMI
- SAKAMATA: sonar and marine mammals
- PARANOID: rapid information processing
- Mine analysis and threat evaluation
- Ship acoustics and underwater acoustic signatures
- PERSEUS Wind Turbine Radar Interference Assessment tool
- Electromagnetic security
- Operating safely at sea
- Operations at sea
- Ocean Space
- National Security
- A new vision on modernizing the emergency reporting process
- Social media in the security sector
- Automatic Video Compilation and Analysis System (AVACS)
- The Dutch Cyber Cube Method: Improving Human Capital for SOCs and CSIRTs
- Concealed weapon detection
- FP7 Project IMPACT Europe
- Critical Infrastructure Protection (CIP) policies in Europe
- @MIGO: border control
- Smarter Surveillance, man, machine, synergy
- Cyber Security of Industrial Control Systems
- Privacy enhancing techniques in cyber security data sharing
- Driving Innovation in Crisis Management with DRIVER+
- Crisis management: new challenges, new opportunities
- The learning professional: resilient and deployable for the long term
- Protection, Munitions & Weapons
- Weapons systems control and analysis
- Weapon Effects & Protection Center
- Firepower
- Protection and survivability of vehicles
- Naval protection and survivability
- Infrastructure protection and survivability
- World-class ballistics research
- Countering Explosive Threats
- Materials for protection concepts
- Processing of Propellants, Explosives and Pyrotechnics
- Ammunition Safety
- Ballistic Performance and Personal Protection
- Chemical, Biological, Radiological and Nuclear (CBRN) Protection
- Anticipating accidents, incidents and threats
- Protecting those who protect us
- Process Safety Solutions: Expertise in Handling Hazardous Conditions Safely
- Expertise groups
- Acoustics and Sonar
- Chemical, Biological, Radiological and Nuclear (CBRN) Protection
- Electronic Defence
- Energetic Materials
- Explosions, Ballistics and Protection
- Human Behaviour and Organisational Innovation
- Human Machine Teaming
- Human Performance
- Intelligent Autonomous Systems.
- Intelligent Imaging
- Military Operations
- Modelling, Simulation and Gaming
- Networked Organisations
- Radar Technology
- Weapon Systems
- Energy Transition
- Roadmaps
- Renewable electricity
- Towards large-scale generation of wind energy
- The important of support structures
- Wind turbines, fully in motion
- Innovation towards 10-20 MW offshore wind turbines
- Modeling 10MW+ turbines aerodynamically
- Design for Reliable Power Performance (D4REL)
- Optimised wind blade tip design
- Vortex-wake models in wind turbine design
- Modelling improvement wind turbine blades
- Converters for Clean, Low Cost Electricity
- Haliade X: largest wind turbine ever
- New research on blade tip improvements
- Less production per wind turbine, still higher yield
- Logistics innovative strength at home and abroad
- Wind turbine management and maintenance
- Wind farms in synergy with the environment
- Innovative methods for wind measurements
- Innovation and the rise of solar energy
- Solar farms respecting landscape and nature
- Solar panels on farmland
- Research innovative solar parks
- Better design of solar parks
- Savings on solar farm operations and maintenance
- Floating solar panels on inland waterbodies
- Offshore solar energy
- National Consortium Solar in Landscape
- National Consortium Solar on Water
- Field lab floating solar
- Research into environmental effects of solar, wind energy
- Solar energy on buildings and infrastructure
- Solar-powered cars
- Mass customization
- Solar panel efficiency
- New technologies make PV more versatile
- Webinar: Innovations in solar energy technologies
- System transition
- Towards a reliable, affordable and fair energy system
- The social aspects of the energy transition
- TNO facilities for research into environmental effects of solar and wind energy
- Effective interventions to increase energy efficiency and reduce energy poverty
- Green and Ease under one roof
- Capacity building programme for energy efficiency in industry
- Zooming in on the future to make the right choices
- Scenarios for a climate-neutral energy system
- A fair system without energy poverty
- Financing the energy transition
- LAUNCH
- Successful neighbourhood approach: motivate residents
- Towards CO2 neutral industry
- Reducing CO2 emissions through capture, use and storage
- SEWGS: revolutionary CO2-reduction technology and blue hydrogen production
- STEPWISE and FReSMe: CO2 reduction solutions for the steel industry
- 3D-printing for CO2 capture productivity increase
- Multi-partner ALIGN-CCUS project
- CEMCAP
- Reduce emissions steel industry
- CO₂ capture with AVR
- On-site CO₂ Capture Services: reducing emissions cost effectively
- Hydrogen for a sustainable energy supply
- Optimising production hydrogen
- Hydrogen storage and transport
- Hydrogen, fuel and feedstock
- H-vision: blue hydrogen to accelerate carbon-low industry
- 15 things you need to know about hydrogen
- World first: Green hydrogen production in the North Sea
- New research centre for hydrogen production
- Identifying the future international chain of green hydrogen
- Opportunities for green hydrogen for the manufacturing industry investigated
- Hydrogen from offshore wind: optimising the electricity grid
- Faraday lab: optimising and scaling up electrolysis
- Blue hydrogen paves the way for green hydrogen
- Biomass to fuels and feedstock
- ARBAHEAT - Sustainable future for coal-fired power stations possible through conversion to biomass
- AMBITION Advanced biofuel production from lignin rich residues
- BECOOL EU Brazilian cooperation on advanced biofuels
- Horti-BlueC - a new EU cooperation on reducing Bio-waste and CO2-footprint in horticulture
- UNRAVEL - valorization of lignocellulosic biomass
- MacroFuels advanced biofuels from seaweed
- BRISK2 Biofuel Research Infrastructure for Sharing Knowledge
- New facility for seaweed processing
- TORWASH technology successful for waste water treatment and recycling plastics
- Biofuels lab: Making transport more sustainable with biofuels
- Take-Off: Sustainable aviation fuels from CO2, water and green energy
- HEREWEAR: Circular textiles from locally-sourced bio-based materials
- Re-use of existing infrastructure to accelerate the energy transition
- Sustainable Industrial Heat System
- 4 pioneering routes to a CO2 neutral industry
- Research facility Industrial Electrification accelerates greening of Rotterdam port
- Mollier facility: innovating in industrial drying technology
- Research facility for negative CO2 emissions
- Carnot lab accelerates sustainable industrial heat management
- Using energy and raw materials efficiently in industry
- e-Missi0n MOOI: TNO supports Dow and Shell in electric cracking
- CO2 reduction requires improvement of industrial processes
- Sustainable subsurface
- Geological Survey of the Netherlands
- Geological Survey of the Netherlands
- 100 years of geological mapping
- GeoTOP
- Sand, gravel and clay extraction
- GIS and other tools for interactive planning
- DINO, Data and Information of the Dutch Subsurface
- BRO: the Dutch Key Register of the Subsurface
- Sustainable use and management Flemish-Dutch subsurface
- Petroleum Geological Atlas of the Southern Permian Basin
- 3D Subsurface mapping of the Dutch offshore
- Geological Survey of the Netherlands across borders
- Towards an energy-producing environment
- Expertise
- Industry
- Roadmaps
- Flexible & Free-form Products
- Space & Scientific Instrumentation
- Semiconductor Equipment
- Smart Industry
- Expertise groups
- Buildings, Infrastructure & Maritime
- Roadmaps
- Buildings & Infrastructure
- Infrastructure
- Sustainable buildings: towards an energy-producing built environment
- Building innovation
- Greenhouse design
- Digitisation in construction
- BTIC promotes living and working in climate-neutral building and infrastructure
- Smart megastructures
- Maritime & Offshore
- Expertise groups
- Circular Economy & Environment
- Roadmaps
- Circular economy
- Environment & Climate
- Sustainable Chemical Industry
- Expertise groups
- Healthy Living
- Roadmaps
- Health Technology & Digital Health
- Biomedical Health
- Work
- Youth
- Expertise groups
- Traffic & Transport
- Roadmaps
- SMART and Safe Traffic and Transport
- Societal impact for accessibility and liveability
- Decision-making information based on facts for municipalities
- Making disruptive technologies practicable
- Accessible, healthy and vibrant cities
- CITYkeys – Performance evaluation framework for smart cities and projects
- Big data ecosystems: collaborating on data-controlled cities
- Knowledge mediator puts an end to bickering
- Intact – Climate resilient critical infrastructure
- Organising mobility
- Smart mobility and logistics
- Smart vehicles
- Sustainable Traffic and Transport
- Sustainable Mobility and Logistics
- Improving air quality by monitoring real-world emissions
- Emission factors for road traffic
- Measuring the emissions of powered two wheelers
- Emissions of particulate matter from diesel cars
- Random Cycle Generator
- EnViVer: model traffic flow and emissions
- Measuring real-world emissions with TNO’s Smart Emissions Measurement System (SEMS)
- Measuring the emissions of trucks and buses
- Reducing Greenhouse Gas Emissions in Commercial Road Transport
- Measuring the emissions of non-road mobile machinery
- Emission measures in practice
- The transition to CO2-neutral mobility in 2050
- Sustainable Vehicles
- Innovative technologies for zero-emission vehicles
- CO2 reduction by high-efficiency Flex Fuel technology with extremely low emissions
- Actual energy consumption and emissions
- Hydrogen and the fuel cell
- Automotive Battery Research
- Making transport more sustainable by means of electric vehicles
- Energy Efficient Electric Bus E3Bus
- eCoMove
- Hydrogen for internal combustion engines in heavy equipment
- Expertise groups
- Information & Communication Technology
- Roadmaps
- Fast open infrastructures
- Data sharing
- Trusted ICT
- Efficiency, effectiveness, quality and the costs of systems
- Expertise groups
- Strategic Analysis & Policy
- Expertise groups
- Strategic Business Analysis
- Strategy & Policy
- Orchestrating Innovation
- Tech Transfer
Drs. Ir. Maran van Heesch
- quantum applications
- quantum computing
- quantum security
- cryptography
Send a question to Drs. Ir. Maran van Heesch
Your question has been sent.
Sorry! Something unexpected happened. Please try again later.