www.techtarget.com Open in urlscan Pro
2606:4700:4400::ac40:973c  Public Scan

URL: https://www.techtarget.com/searchenterpriseai/definition/crypto-agility
Submission: On August 06 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST https://www.techtarget.com/search

<form action="https://www.techtarget.com/search" method="post" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" placeholder="Search the TechTarget Network">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>

Text Content

Enterprise AI
Search the TechTarget Network
Login Register
Explore the Network
 * TechTarget Network
 * Business Analytics
 * CIO
 * Data Management
 * ERP

 * Enterprise AI
 * * AI Business Strategies
   * AI Careers
   * AI Infrastructure
   * AI Platforms
   * AI Technologies
   * More Topics
      * Applications of AI
      * ML Platforms
   Other Content
    * News
    * Features
    * Tips
    * Webinars
    * 2023 IT Salary Survey Results
    * Sponsored Sites
    * More
       * Answers
       * Conference Guides
       * Definitions
       * Opinions
       * Podcasts
       * Quizzes
       * Tech Accelerators
       * Tutorials
       * Videos

 * Follow:
 * 
 * 
 * 
 * 
 * 


 * Home
 * Artificial intelligence platforms

Definition


CRYPTO-AGILITY


 * Share this item with your network:
 * 
 * 
 * 
 * 
 * 

 * 
 * 
 *  * 
    * 
    * 
    * 


By
 * Alexander S. Gillis, Technical Writer and Editor


WHAT IS CRYPTO-AGILITY?

Crypto-agility, or cryptographic agility, is a data encryption practice used by
organizations to ensure a rapid response to a cryptographic threat. The idea is
to adapt to an alternative cryptographic standard quickly without making any
major changes to infrastructure.

Cryptography is the method of protecting information and communications using
hard-to-decipher codes so that only the intended recipient can process and read
the information. Cryptography uses mathematical and rule-based algorithms to
secure information. Crypto-agility is an additional safety measure for
organizations; it can also be seen as an incident response mechanism.

Typically, crypto-agility is used when the encryption algorithm of a system is
discovered to be vulnerable. Other use cases include when an algorithm breaks
suddenly or when there's a security compromise. If one of these cases arises, an
organization needs to be able to switch to using a different encryption method
quickly to minimize damage. This process includes switching out cryptographic
algorithms, security keys, certificates and other crypto technologies.

Organizations will use cryptography broadly in their environments, such as in
Transport Layer Security and Secure Socket Shells. Typically, mission-critical
communication systems will also make use of crypto-agility. Without
crypto-agility, if an organization's cryptographic systems are compromised, they
may be open to attack, leading to loss of business.


IMPORTANCE OF CRYPTO-AGILITY

Cryptographic techniques don't stay secure forever. For example, increasing
computing power also leads to the increased ability for hostile programs to
successfully break previously secure cryptographic functions. Before this
happens, previous cryptographic systems -- such as public key encryption, key
exchange and digital signatures -- must be switched over to new encryption
systems to stay secure. Crypto-agility is also a relatively sustainable
practice, meaning this process won't become a liability.

One of the main strengths of quantum computing is its power to crack classic
crypto systems. As a result, quantum computing is beginning to pose a threat to
modern cryptography. Just having one enterprise encryption strategy isn't viable
if an organization wants to ensure secure connections. Being able to switch over
to a different cryptography system is imperative. Quantum cryptography systems
and quantum key distribution (QKD) are able to aid against some of the major
issues facing modern cryptography. However, QKD only focuses on secure key
distribution.

Although post-quantum security is not an issue for all organizations today, some
experts believe that those needing to secure data over time should aim toward
crypto-agility above all else.




HOW TO ACHIEVE CRYPTO-AGILITY

To set up and achieve crypto-agility, an organization must do the following:

 * Define policies. Ensure that everyone in the organization knows what is
   needed to secure their systems and who is responsible for what.
 * Determine group responsibility. Each group is responsible for having and
   maintaining an inventory of their assets. This allows each team to react
   quickly to any threats.
 * Central organization. This will most likely be a security group that will
   help develop an inventory and provide any necessary tools. Each team will
   then need to make sure they can use each tool.

On the hardware side, crypto-agility is achieved by adopting new frameworks for
incident response and application development. In addition, a layer of software
is required for cryptographic application programming interfaces (APIs) and
secure update mechanisms.


CRYPTO-AGILITY BEST PRACTICES

Best practices surrounding crypto-agility include the need for the following:

 * Develop a method for tracking ownership.
 * Automate as many areas as possible, such as management and replacement
   tracking.
 * Inventory all crypto assets.
 * Have good visibility and a good understanding of who owns what.
 * Ensure crypto technology uses the latest cryptography techniques and
   algorithms.
 * Use high bit sizes for hash algorithms.
 * Identify vulnerabilities.


HOW TO IMPROVE CRYPTO-AGILITY

To improve crypto-agility practices, organizations can do the following:

 * Ensure visibility, meaning an organization should have a full understanding
   of where and how cryptography is used throughout their infrastructure.
 * Ensure the correct teams or groups retain ownership of their assigned crypto
   assets.
 * Ensure any used hardware vendors are quick to release updates or security
   patches or else an organization might need to switch their cryptography
   methods more often.


HISTORY OF CRYPTO-AGILITY

The first cryptographic standards were introduced in the 1970s, when
cryptographic algorithms were first used for symmetric-key encryption, digital
signatures and hash functions. There have been many cryptographic standards
since this time, including RSA (Rivest, Shamir and Adleman), AES (Advanced
Encryption Standard) and ECC (elliptic curve cryptography).

Since the 2010s, public key infrastructure (PKI) has been integrated into
business applications using public key certificates. However, as time goes on,
algorithms will become weak and insecure. For example, Data Encryption Standard
(DES) used to be a symmetric encryption standard, but is now seen as weak since
it has too small of a key length. MD5 (Message Digest 5) and SHA1 (Secure Hash
Algorithm 1) were well-known hash functions that were broken. RSA-1024 was a
standard for asymmetric encryption, but it became ineffective when key sizes
changed.

New standards, such as ECC, will also weaken over time. Whenever a cryptographic
standard is broken, it needs to be replaced with other cryptographic standards.
The method of adapting -- crypto-agility -- came from this pattern.

With the threat of quantum computing in the future, organizations such as NIST
are starting to research new cryptographic standardization methods. It predicts
quantum computing will defeat modern public key cryptography algorithms, so new
approaches, such as QKD, must be introduced.

This was last updated in April 2023

CONTINUE READING ABOUT CRYPTO-AGILITY

 * How to prepare for post-quantum computing security

 * What’s happening with quantum-safe cryptography?

 * Why you should start your post-quantum encryption migration now



RELATED TERMS

What is a validation set? How is it different from test, train data sets? A
validation set is a set of data used to train artificial intelligence (AI) with
the goal of finding and optimizing the best ... See complete definition What is
machine translation? Machine translation technology enables the conversion of
text or speech from one language to another using computer algorithms.
See complete definition What is natural language understanding (NLU)? Natural
language understanding (NLU) is a branch of artificial intelligence (AI) that
uses computer software to understand input ... See complete definition

DIG DEEPER ON ARTIFICIAL INTELLIGENCE PLATFORMS

 * HOW TO PREPARE FOR A SECURE POST-QUANTUM FUTURE
   
   

 * CRYPTOGRAPHY
   
   
   By: Kathleen Richards

 * LINUX GROUP ANNOUNCES POST-QUANTUM CRYPTOGRAPHY ALLIANCE
   
   
   By: Alexander Culafi

 * HANDBOOK HELPS DUTCH ORGANISATIONS MIGRATE TO QUANTUM-SAFE COMMUNICATION
   
   

Sponsored News
 * Driving Digital Transformation in Retail –Dell Technologies
 * Drive Efficiency and Innovation with Flexible IT –Dell Technologies
 * See More

Vendor Resources
 * Jargon Buster Guide to Post Quantum Cryptography –TechTarget
   ComputerWeekly.com
 * A Security Assessment of Android Full-disk Encryption –TechTarget
   ComputerWeekly.com



Latest TechTarget resources
 * Business Analytics
 * CIO
 * Data Management
 * ERP

Business Analytics
 * 10 top data discovery tools for insights and visualizations
   
   Data discovery can use sampling, profiling, visualizations or data mining to
   extract insights from data. Choose from 10 of the ...

 * Use LLMs for data analysis to improve business operations
   
   Data professionals can use LLMs for data and predictive analytics work.
   Still, the analysis of large amounts of textual and ...

 * Google Cloud's BigQuery gets AI injection, Looker to follow
   
   The tech giant's latest analytics and data management moves include the
   general availability of Gemini in BigQuery and the ...

CIO
 * 9 AI-proof IT jobs, plus how to be irreplaceable
   
   As automation and artificial intelligence tools do more work in more
   organizations, some technologists are worried AI will take ...

 * GenAI strategy dictates ROI challenges for IT leaders
   
   Enterprises can scale generative AI deployments in different ways. Each
   alternative comes with its own set of cost considerations...

 * 13 key ESG and sustainability trends, ideas for companies
   
   From consumers to employees to investors, more people are choosing companies
   that prioritize environmental, social and governance...

Data Management
 * Generative AI shines spotlight on data governance and trust
   
   Generative AI creates new opportunities for how organizations use data.
   Strong data governance is necessary to build trust in the...

 * New Snowflake service enables secure AI, ML deployment
   
   Snowpark Container Services aims to provide the vendor's users with a secure
   environment for deploying and managing models and ...

 * New features make Google's Spanner a database for AI
   
   The introduction of graph processing, vector search and full-text search
   optimize Spanner for developing and managing modern ...

ERP
 * 7 benefits of using a 3PL provider for reverse logistics
   
   A 3PL with experience working with supply chain partners and expertise in
   returns can help simplify a company's operations. Learn...

 * 8 top enterprise asset management software products
   
   Neglecting enterprise asset management can lead to higher equipment costs and
   delayed operations. Learn more about EAM software ...

 * 8 top inventory management software products
   
   Inventory management software can help companies manage their supply chain in
   a turbulent world, but using the right product is ...

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Advertisers
 * Partner with Us
 * Media Kit
 * Corporate Site

 * Contributors
 * Reprints
 * Answers
 * Definitions
 * E-Products
 * Events
 * Features

 * Guides
 * Opinions
 * Photo Stories
 * Quizzes
 * Tips
 * Tutorials
 * Videos

All Rights Reserved, Copyright 2018 - 2024, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information


Close