Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

HP Launches Printers With Quantum Resilient Cryptography 

Printers can sit in the corner for ten years or more, while quantum decryption is thought by many to be less than 10 years away.

At this year’s HP Amplify conference, the firm announced ‘the world’s first business printers to protect against quantum computer attacks’.

The printers incorporate the Leighton-Micali Signature (LMS) which is a stateful hash-based signature (HBS) scheme. LMS was approved by NIST for post quantum use in 2020 and is described in Special Publication 800-208.

NIST describes the use case profile as, “The authentication of firmware updates for constrained devices. Some constrained devices that will be deployed in the near future will be in use for decades. These devices will need to have a secure mechanism for receiving firmware updates, and it may not be practical to change the code for verifying signatures on updates once the devices have been deployed.”

This could be a description of the modern printer. It explains HP’s motivation for incorporating LMS on two counts: private users and government sales. 

On the first count, the modern printer is an edge device, quite similar in processing capabilities to a PC. But, as Steve Inch, print security strategist & product management lead at HP, told SecurityWeek, “Printers are traditionally the low man on the totem pole when it comes to priorities for security teams. It’s this box over in the corner. It doesn’t move; it’s just there. It’s not ignored but it’s a low priority for security teams.”

While edge devices generally, and especially printers, may be low priority for defenders, they are high priority for attackers – not least because they are internet-facing with an IP address. There are many ways that attackers can locate exposed printer IPs, and WithSecure research noted in June 2024, “Edge services are often internet accessible, unmonitored, and provide a rapid route to privileged local or network credentials on a server with broad access to the internal network.”

Printers don’t have the typical third party defensive apps, such as anti-malware, that can be used to protect them. This throws the security onus on the manufacturer. Inch believes it is incumbent on each manufacturer to counter the inherent insecurity of printers by building strong security into the hardware itself with layers of protection starting at the kernel level.

“Starting with the chipset and the ASIC we have incorporated a foundation for quantum resistance around the cryptography related to digital signatures. So, our devices have the BIOS boot-up, and when that BIOS is engaged, we can be confident in knowing that the device cannot be cracked.”

Advertisement. Scroll to continue reading.

Remember that printers can sit in the corner for ten years or more, while quantum decryption is thought by many to be less than 10 years away.

In this sense, HP is giving its users a helping hand in the wholesale migration to quantum resistant encryption by providing it on a plate (or in the ASIC). That’s no small matter. “I don’t think there is a human being on the planet that could unequivocally give you a demonstration of complete visibility into their encryption and the touch points in their infrastructure,” says Inch. Finding all those touchpoints and migrating the relevant algorithms to PQC is going to be a lengthy process

“The printers’ new ASIC chips are designed with quantum-resistant cryptography and enable the use of digital signature verification to protect firmware integrity against quantum attacks,” says HP.

The second reason for incorporating quantum resistant cryptography now is to protect its own commercial sales into government. NIST has long required that federal government agencies should complete the migration to quantum-resistant cryptography by 2035. Again, we have those 10 years. But in December 2024, the NSA threw a spanner in the works by declaring that all new acquisitions for national security systems must be CNSA 2.0 compliant from January 1, 2027. CNSA 2.0 provides the list of cryptographic algorithms that are considered-quantum-resilient – that is, those so defined by NIST.

That gives appliance manufacturers, such as HP, less than two years to ensure their devices are quantum resistant if they wish to sell into the national security systems market.

The dual purpose of launching these quantum resistant printers now at this year’s HP Amplify is to provide security for edge devices and ready-made quantum migration for commercial users: and to maintain HP’s access to the national security systems market.

The new printers also offer seamless integration with customers’ zero trust implementations. The printers incorporate HP’s Zero Trust Architecture, which, says Inch, “is almost plug and play with whatever flavor of zero trust is being used by the customer.” This is in furtherance of his principle that it is the printer manufacturer’s responsibility to embed security into the device rather than wait for the user to do something.

Related: Xerox Versalink Printer Vulnerabilities Enable Lateral Movement

Related: 200 Canon Printer Models May Expose Wi-Fi Connection Data

Related: NIST Announces HQC as Fifth Standardized Post Quantum Algorithm

Related: Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.