"Prepare for a New Cryptographic Standard to Protect Against Future Quantum-Based Threats"

The existing public-key cryptography, which is susceptible to quantum-based attacks, will be replaced by a new post-quantum cryptographic standard, according to the National Institute of Standards and Technology (NIST). The term "post-quantum cryptography," sometimes known as "quantum-resistant cryptography," refers to cryptographic techniques that are assessed to be resistant to attack by either a Cryptanalytically Relevant Quantum Computer (CRQC) or classical computer. Although the new post-quantum cryptographic standard will not be available for use in commercial products until 2024, the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and NIST urge organizations to start preparing for the transition now by adhering to the Post-Quantum Cryptography Roadmap. It involves inventorying the organization's systems for applications that use public-key cryptography, creating a plan for transitioning the organization's systems to the new cryptographic standard, creating acquisition policies regarding post-quantum cryptography, alerting the organization's IT departments and vendors about the upcoming transition, and educating the workforce about the transition and providing any applicable training. This article continues to discuss NIST's announcement of the new post-quantum cryptographic standard. 

CISA reports "Prepare for a New Cryptographic Standard to Protect Against Future Quantum-Based Threats"

Submitted by Anonymous on