Research Blogs Feed 09月29日 10:49
Zscaler推出后量子密码学可见性报告,助力应对量子计算安全挑战
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

随着量子计算的快速发展,传统加密算法面临被破解的风险。Zscaler率先推出后量子密码学(PQC)可见性报告,帮助客户监控和管理向量子安全算法的过渡。该报告提供关于PQC算法在客户流量中的应用详情,包括最常使用的PQC密钥交换和SSL/TLS版本、PQC与非PQC流量的分布,以及参与PQC密钥交换的主要用户。此外,Zscaler还更新了Web Insights日志报告和NSS Feeds,以提供更细粒度的量子算法数据,从而降低PQC过渡的复杂性,帮助企业识别和缓解风险,确保兼容性和合规性,并抵御量子威胁。

🛡️ **量子计算的崛起与安全威胁**:量子计算机能够以前所未有的速度处理信息,尤其是在破解传统加密算法方面,对现有网络安全构成严峻挑战。攻击者已开始利用“先捕获,后解密”的策略,预示着向量子抗性算法(PQC)迁移的紧迫性。

📊 **Zscaler PQC可见性报告**:Zscaler新推出的后量子密码学可见性报告,为客户提供了关键的洞察,包括PQC算法在流量中的应用情况、最常使用的PQC密钥交换和SSL/TLS版本、PQC与非PQC流量的分布,以及哪些用户正在使用PQC密钥交换。

🔍 **增强的数据可见性与分析**:通过更新Web Insights日志报告和NSS Feeds,Zscaler提供了更细粒度的量子算法数据,使客户能够深入了解其环境中的加密流量,包括客户端和服务器端的密钥交换及数字签名算法,这有助于识别潜在的配置错误和不兼容的客户端。

🚀 **简化PQC过渡与风险管理**:Zscaler的新功能旨在降低向后量子密码学过渡的复杂性。客户可以识别和缓解与PQC采用相关的风险,区分经典与PQC算法的使用,了解客户端软件的兼容性,并识别如纯PQC密钥交换等配置不当之处,确保符合行业最佳实践。

🔒 **保障未来量子安全**:Zscaler的PQC可见性报告是其迈向量子安全未来的第一步。通过提供必要的可见性,Zscaler正在为后续阶段的TLS流量解密和检查,以及在Zero Trust Exchange平台上完全支持后量子数字签名奠定基础,最终实现向量子抗性算法的全面过渡。

Quantum computing is set to redefine the world's computational capabilities. Classical computers manipulate data in binary 0s and 1s, but quantum computers allow for a single quantum bit (or qubit) to represent multiple states simultaneously—this means that tasks formerly deemed computationally infeasible, like factoring large numbers, will be solved exponentially faster.  Of course, this comes with risk. When quantum computing achieves large-scale usage, malicious actors will be able to use these powerful machines to break certain traditional encryption algorithms. Threat actors are already using a tactic called “harvest now, decrypt larger” in which they capture and steal encrypted data with the intention to decrypt it down the road. Therefore, transitioning to quantum-resistant algorithms, known as Post-Quantum Cryptography (PQC), is on the short-term roadmap for many CISOs.Zscaler is committed to providing the highest level of security for our customers and that includes timely adoption of the latest innovations in the encryption space. In that spirit, we’re excited to launch the Post-Quantum Cryptography Visibility report, now generally available to all customers in the Zscaler Admin Portal which can be accessed under Analytics > Interactive Reports > Web Activity > Post Quantum Cryptography Visibility.The new interactive report provides insights including details on PQC algorithms as applied to customer traffic including:Most frequently used PQC Key Exchange and SSL/TLS versionsDistribution of transactions, differentiating between traffic processed with PQC and non-PQC key exchangeTop users that have engaged in PQC key exchangeAccess Quantum Algorithm Data in Web Insights LogsWe know our customers need to access data in different ways that suit their workflows, and to that end we’ve updated the Web Insights Log report also  to include quantum algorithm data at a granular level. The new fields and columns include:Client Digital Signature ProposalClient Key Exchange ProposalClient Side Key Exchange AlgorithmServer Side Key Exchange AlgorithmClient Side Digital Signature AlgorithmServer Side Digital Signature AlgorithmNanolog Streaming Service (NSS) Feeds Updated to Enable Ingesting Quantum Algorithm Data via APICustomers can also add the new fields listed below to the Feed Output Format when configuring an NSS or Cloud NSS feed for web logs. Once ingested via API into a SIEM or other data manipulation tool, IT or Security stakeholders can further examine the data for further analysis.%d{client_tls_keyex_pqc_offers}%d{client_tls_keyex_non_pqc_offers}%d{client_tls_keyex_hybrid_offers}%d{client_tls_keyex_unknown_offers}%d{client_tls_sig_pqc_offers}%d{client_tls_sig_non_pqc_offers}%d{client_tls_sig_hybrid_offers}%d{client_tls_sig_unknown_offers}%s{client_tls_keyex_alg}%s{server_tls_keyex_alg}%s{client_tls_sig_alg}%s{server_tls_sig_alg}Reduce the Friction of Transitioning to Post-Quantum CryptographyAccess to more data about your organization’s environment and the traffic it generates will reduce the friction of transitioning to post-quantum cryptography. With these new capabilities you can focus on three areas of activity to apply this new post-quantum cryptographic algorithm data for both strategic planning and operational execution:Identify and mitigate risks associated with post-quantum adoptionUnderstand how traffic is segregated between classical vs. PQC algorithms when it comes to what crypto stack and client algorithms are in use.Know what key exchange algorithms are in use by client software or other software services in your environment: the visibility we provide can show you what clients across your organization are not PQC-ready.Identify misconfigurations such as the usage of pure PQC key exchange algorithms instead of the industry-recommended hybrid approach. Visibility ensures that configurations adhere to best practices.Ensure compatibility and regulatory complianceMonitor hybrid cryptography use: many organizations will use hybrid cryptographic models during their transition from classical algorithms to PQC—for example, combining traditional algorithms (ECDHE) with post-quantum algorithms (ML-KEM). Visibility ensures that hybrid schemes are properly implemented and monitored for the strongest security.Manage algorithm vulnerabilities: knowing which algorithms are being used allows organizations to monitor for potential issues and pivot quickly if a particular algorithm is compromised or no longer recommended by the regulators or the security community.Protect against quantum threats and data theft todayClassical encryption detection: customers can monitor whether classical algorithms, such as ECDHE, are still being used alongside or instead of post-quantum algorithms. Doing so can detect transitional flaws during  migrations from classical to quantum-resistant algorithms. Additionally, you can detect where older encryption methods are still used, exposing critical data to quantum threats (e.g., rapidly decrypting data that is transferred over communications leveraging a traditional key exchange algorithm instead of post-quantum algorithm).Encryption strength monitoring: Organizations can confirm that PQC algorithms are being correctly implemented to safeguard traffic from future quantum-powered decryption.Building the Foundation for a Quantum-Safe FutureThis release marks the first of three phases of Zscaler’s vision for a Post-Quantum Era: Now that we’re providing the visibility you need to know what quantum algorithms are in use on the traffic in your environment, we’re working now towards our second phase milestone of  enabling full decryption and inspection of TLS traffic leveraging post-quantum key exchange. In our third phase we’ll support post-quantum digital signatures across the Zero Trust Exchange platform and fully transition to quantum-resistant algorithms. In summary, Zscaler is building the foundation for a secure digital future.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

量子计算 后量子密码学 PQC 网络安全 加密 Zscaler Quantum Computing Post-Quantum Cryptography PQC Cybersecurity Encryption Zscaler
相关文章