In Memoriam
Professor Ross Anderson (1956–2024) died unexpectedly in March 2024, leaving an intellectual legacy that has never been more relevant. As the founder of security economics—the discipline that examines how incentives, rather than technology alone, determine security outcomes—Anderson's insights illuminate the challenges financial institutions now face in migrating to post-quantum cryptography.
This tribute examines Anderson's seminal 2001 paper "Why Information Security is Hard – An Economic Perspective" and his later work on protocol maintenance costs, demonstrating how his prescient analysis anticipated the very obstacles that make PQC migration so difficult today.
The Central Insight: It's the Incentives, Not the Technology
Anderson's foundational observation was deceptively simple yet revolutionary:
"Information insecurity is at least as much due to perverse incentives... Many of the problems can be explained more clearly and convincingly using the language of microeconomics."
Before Anderson, the security community believed better tools would solve security problems. He demonstrated that the real barriers were economic: network externalities, asymmetric information, moral hazard, adverse selection, liability dumping, and the tragedy of the commons.
Why this matters for PQC: Financial institutions today face the same perverse incentives Anderson identified. The party in the best position to implement PQC protection (the bank) is often not the party who will suffer most from quantum-enabled decryption attacks (the customer whose data is harvested today for decryption in 2035).
Liability Dumping: Anderson's Banking Prophecy
Anderson's early research on ATM fraud revealed a pattern that persists today:
"In the USA, if a customer disputed a transaction, the onus was on the bank to prove that the customer was mistaken or lying; this gave US banks a motive to protect their systems properly. But in Britain, Norway and the Netherlands, the burden of proof lay on the customer... Since this was almost impossible, the banks in these countries became careless."
The result? US banks, despite spending less on security, achieved better outcomes—because their incentives aligned protection with liability.
The PQC parallel is striking. Under current liability frameworks, banks have had limited economic incentive to begin expensive PQC migrations when:
- Quantum computers capable of breaking RSA don't yet exist
- Until the January 2025 EU DORA, banking sector regulations haven't explicitly mandate PQC readiness
- Customers cannot prove their data was harvested for future decryption
- The harm from "Store Now, Decrypt Later" attacks won't materialise for years
Anderson would immediately recognise this as a classic liability dump: banks control protection decisions today, but the customer (and eventually society) bears the risk tomorrow.
The Tragedy of the Commons and Cryptographic Infrastructure
Anderson's application of the "Tragedy of the Commons" to distributed denial-of-service attacks translates directly to cryptographic infrastructure:
"While individual computer users might be happy to spend $100 on anti-virus software to protect themselves against attack, they are unlikely to spend even $1 on software to prevent their machines being used to attack Amazon or Microsoft."
For PQC migration: Cryptographic infrastructure has been a shared commons for decades. TLS certificates, HSMs, key management systems, and cryptographic libraries are embedded throughout banking infrastructure, managed by different teams with different budgets and priorities. No single owner has the authority—or the budget—to upgrade everything.
The tragedy unfolds when each business unit sees PQC as "someone else's problem," shared infrastructure teams lack budget for quantum-safe upgrades, and third-party vendors await customer demand before investing.
Network Externalities and the "Microsoft Philosophy"
Anderson explained why software ships insecure:
"The huge first-mover advantages that can arise in economic systems with strong positive feedback are the origin of the so-called 'Microsoft philosophy' of 'we'll ship it on Tuesday and get it right by version 3'... This is perfectly rational behaviour in many markets where network economics apply."
The PQC vendor landscape exhibits identical dynamics. Discovery tool vendors race to market, prioritising features and speed over comprehensive testing. Integration complexity is pushed onto customers. Banks are sold tools designed to appeal to procurement timelines rather than operational reality.
The Protocol Maintenance Problem
Anderson's later work, particularly "The Initial Costs and Maintenance Costs of Protocols" (Security Protocols 2005), directly anticipated PQC challenges:
"Security maintainability is the elephant in the living room; people know there's an awful problem but are generally too polite to mention it."
He identified why the security community long ignored maintenance:
"Vendors used to not care very much; after all, people replace their mobile phones every year, and their PCs every three to five years, so why not just wait for the vulnerable equipment to be thrown on the skip?"
PQC migration breaks this assumption catastrophically. Banking infrastructure operates on 20–30 year replacement cycles. HSMs, core banking systems, and SWIFT interfaces installed in the 2010s will still be operational in 2035. You cannot wait for "vulnerable equipment to be thrown on the skip" when quantum computers may break currently deployed encryption before scheduled hardware refresh.
Asymmetric Information and the "Lemons" Problem
Anderson applied Akerlof's famous "lemons" analysis to security products:
"When buyers don't have as much information about the quality of products as sellers do, there will be severe downward pressure on both price and quality."
The PQC market exhibits classic "lemons" characteristics:
- Buyers cannot easily evaluate cryptographic implementation quality
- Claims about "quantum-safe" products cannot be verified by non-specialists
- Market selection favours vendor marketing over technical merit
- The "nobody gets fired for buying IBM" effect drives procurement toward established names regardless of PQC competence
The Common Criteria Failure and Certification Theatre
Anderson's critique of security evaluation was blistering:
"The European equivalent, ITSEC, introduced a pernicious innovation – that the evaluation was not paid for by the government but by the vendor seeking an evaluation on its product... This motivated the vendor to shop around for the evaluation contractor who would give his product the easiest ride."
This warning applies directly to emerging PQC certifications. As quantum-safe products enter the market, certification schemes will emerge. Without structural changes to who pays for evaluation and who bears liability for certification failures, these schemes will reproduce the pathologies Anderson identified.
"Making Security Sustainable": Anderson's Final Warning
Anderson's 2018 CACM article addressed long-term software maintenance:
"We have no idea how to patch 20-year-old software; so we will need fresh thinking about compilers, verification, testing, and much else."
This is the PQC challenge in a nutshell. Financial services infrastructure requires security maintenance for decades. Yet we have no established methodology for migrating cryptographic algorithms across 20+ year system lifetimes while maintaining operational continuity.
Applying Anderson's Framework to PQC Strategy
What would Anderson advise a financial institution beginning PQC migration?
1. Map the Incentives, Not Just the Infrastructure
Before any technical discovery, understand: Who bears the cost of migration? Who suffers the consequences of delay? What regulatory changes would shift these incentives?
2. Assign Clear Liability
Establish accountable ownership before deployment. Anderson's research showed that security improves when the party who can protect a system is also the party who suffers from failure.
3. Budget for Maintenance, Not Just Implementation
PQC isn't a one-time deployment; it's a 20-year maintenance commitment. Build budget cases that reflect ongoing cryptographic agility costs.
4. Distrust Vendor Certifications
Apply Anderson's scepticism to PQC product claims. Ask who paid for evaluations, who benefits from positive findings, and what liability vendors accept.
5. Coordinate to Escape the Tragedy of the Commons
Individual bank action is insufficient. Industry coordination (through bodies like FS-ISAC and CMORG) and regulatory frameworks (like DORA) are necessary to overcome collective action problems.
6. Start with Governance, Not Tools
Anderson's analysis of why technical solutions fail makes clear: governance frameworks, liability assignments, and budget authority must precede technical deployment.
Conclusion: The Prescience of a Pioneer
Ross Anderson saw further than anyone. In 2001, he predicted that security would increasingly become an economic problem requiring economic solutions. His work on protocol maintenance costs anticipated the PQC challenge by two decades. His analysis of liability dumping explains why banks hesitate to begin expensive migrations whose benefits accrue to future customers.
As Bruce Schneier wrote in his obituary: "He was the first person to understand that security problems are often actually economic problems."
For PQC migration, this insight is not merely academic—it is operational. Financial institutions that treat PQC as purely a technology problem will fail. Those that apply Anderson's economic lens—understanding incentives, liabilities, and coordination requirements—will navigate the transition successfully.
We stand on the shoulders of giants. Ross Anderson gave us the conceptual tools to understand why security is hard. It falls to us to apply those tools to the greatest cryptographic transition since the move to public-key cryptography.
Key References: