Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementLogical Security

It's time to prepare for quantum computing’s impact on DNS security

By Peter Lowe
gold computer chip

Image via Unsplash

February 14, 2023

Mainstream quantum computing may still be years away, but cybersecurity efforts to protect against quantum attacks can’t wait. When quantum computing does make its entrance, it could quickly eviscerate the cryptography that currently protects online communications, such as the digital signatures used in the domain name system (DNS) and the key exchanges used in transport layer security (TLS).  

Fortunately, efforts to protect against how quantum computers could be used in cyberattacks have been underway for years. The National Institute of Standards and Technology (NIST) launched its post-quantum cryptography program in 2016, and in July selected the initial group of algorithms eligible for standardization. But the industry needs to prepare now because updating systems for quantum capabilities will have its challenges. 

The quantum threat to DNS 

DNS manages the flow of traffic on the internet. And the cryptography used in DNS Security Extensions (DNSSEC) is essential to the safe routing of traffic, using digital signatures or symmetric keys to verify that websites and data are what they purport to be. Strong cryptography is the only way to ensure that users can trust the results. 

Today’s current level of cryptography works well, rendering data as a random sequence of bytes that are useless to anyone without a key. However, quantum computing will change that with processing power which will make current cryptography obsolete.  

The quantum bits, or qubits, used in quantum computing work in a different, much faster way than the binary bits used in traditional computing, enabling quantum machines to not only code information more quickly but also to store information immediately. Attackers would be able to access data, store and decrypt it later — and decrypt it much more easily with the power of quantum computing. Encrypted data will likely not stay encrypted for as long as intended. 

Quantum computing also will present challenges to DNS’ capacity to handle traffic, because of the larger key and signature sizes that post-quantum cryptography will use. Larger key sizes will require greater computational resources, but, more importantly, may create packet sizes too large for the universal datagram protocol (UDP) used by DNS servers to handle.

In addition to the effects on infrastructure, quantum presents other challenges. Updating ciphers is already a risky process, especially for those running root servers if the servers don’t restrict who can perform updates. If passphrases used to generate the keys are compromised, an attacker could fake any domain verification. 

The Internet Corporation for Assigned Names and Numbers (ICANN) also would have to review the key signing ceremony that occurs every three months to generate the cryptographic keys used at the top of the DNSSEC chain. If a quantum attack were to compromise those keys, all of the DNS requests made could be affected. 

What organizations can do to prepare 

Preparing for a post-quantum world begins with a shift in mindset, acknowledging that many aspects of IT will change. Security leaders need, for example, to let go of the idea that messages will remain private forever. Security leaders have become accustomed to the notion that what gets encrypted stays encrypted, at least for any foreseeable future. And quantum computing could shorten the time it takes to break encryption by an order of magnitude. 

A message sent today with end-to-end encryption (E2EE) might not be breakable currently, so attackers are less likely to bother keeping it. However, because quantum computing may make it breakable fairly soon, attackers may see storing encrypted — but potentially critical — data today for later decryption as a viable tactic.  

Organizations such as financial institutions and governments, which regularly deal with high-risk data, should start preparing to make use of post-quantum algorithms as soon as possible. It might seem like they have plenty of time, with quantum computing still under the horizon, but those preparations are a long process. Key steps include: 

  • Identify where an organization uses encryption, document the procedures and algorithms currently used and map the retention requirements for each type of data stored. Organizations and their security teams need to implement more flexible procedures for storing data in order to be ready for post-quantum changes. The more rigid the procedures that organizations and their security teams have in place, the more difficult they will be to update when the time comes. 
  • Prepare to re-encrypt data when post-quantum standards are ready. If data can be deleted, delete it. But if it must be stored forever, organizations need to be prepared to apply the new algorithms to protect that data from becoming vulnerable. 
  • Keep abreast of the latest developments in quantum computing, via newsletters, updates from NIST and other reliable sources. The whole point of preparing is to not be surprised by new developments, so regularly checking on the status of quantum computing is a critical part of that planning.  

Expecting the next steps 

NIST’s selection of the first four encryption algorithms designed to withstand a quantum attack resulted from a six-year effort, but it’s still only the initial step in the final phase of developing a post-quantum cryptographic standard, which NIST expects to be completed within two years. A second round of algorithms is expected to be announced soon. 

But when it comes to securing the DNS, the challenges are not so much algorithmic as they are operational. Hardware will have to be upgraded to handle the increased processing of quantum computing. Existing protocols must be adjusted or new ones introduced, to handle the increased key sizes. One option could be hash-based signatures. They have stood up well against post-quantum cryptography and don’t involve much overhead when they need to be changed, but when dealing with the volume of traffic DNS handles, even low overhead can be significant. 

At the moment, there is no complete solution on the table. However, progress is underway. NIST and other standards-making bodies, such as the Institute of Electrical and Electronics Engineers (IEEE), are working on the algorithmic changes. Organizations that must protect their data for the long haul must begin preparing for the operational changes that will follow. 

KEYWORDS: business resilience data management domain name systems (DNS) attacks encryption NIST quantum computing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Peter Lowe is the Principal Security Researcher at DNSFilter

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hacker hacktivist

    It’s time to prepare for the rise of hacktivism (and its side effects)

    See More
  • blurred keyboard with wavy lines

    The impact of quantum computers and IoT devices on network security

    See More
  • quantum-tech-freepik1170.jpg

    Quantum computing cybersecurity bill to help strengthen data protection & national security

    See More

Events

View AllSubmit An Event
  • November 14, 2024

    Best Practices for Integrating AI Responsibly

    ON DEMAND: Discover how artificial intelligence is reshaping the business landscape. AI holds immense potential to revolutionize industries, but with it comes complex questions about its risks and rewards.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!