Earlier in 2024, NIST (the National Institute of Standards and Technology) released finalised standards for PQC (post-quantum cryptography). These three standards cover two forms of digital signatures as well as public key encapsulation. This achievement, the culmination of a process that began in 2...
Earlier in 2024, NIST (the National Institute of Standards and Technology) released finalised standards for PQC (post-quantum cryptography). These three standards cover two forms of digital signatures as well as public key encapsulation. This achievement, the culmination of a process that began in 2016, is a significant milestone in standards development, helping to ensure information on the internet remains confidential and secure now and in the future.
Size: 1.12 MB
Language: en
Added: Apr 14, 2025
Slides: 8 pages
Slide Content
The Quantum Future of
Cryptography
Earlier in 2024, NIST (the National Institute of Standards and Technology)
released finalised standards for PQC (post-quantum cryptography). These three
standards cover two forms of digital signatures as well as public key
encapsulation. This achievement, the culmination of a process that began in
2016, is a significant milestone in standards development, helping to ensure
information on the internet remains confidential and secure now and in the
future.
What Is Post-Quantum
Cryptography?
Purpose
Post-quantum cryptography is
designed to guard against the risk of,
in the foreseeable future, the ability of
CRQCs (cryptographically relevant
quantum computers) to crack the
codes deployed in modern encryption
technologies.
Implementation
It does this by implementing new
algorithms and defining standards,
which work to resist attack from both
quantum and classical computers.
Compatibility
All of the newly released standards can run on classical computers, so there's no
need to wait for the arrival of quantum computers to prepare for and mitigate
against the threat.
The Role of Encryption
Protection
Encryption plays a key role
in our modern digital
society, protecting electronic
confidentiality.
Medical Records
Sensitive medical
information remains secure
through encryption
technologies.
Email Messages
Private communications are
kept confidential through
encryption protocols.
Photo Libraries
Personal media collections
are safeguarded from
unauthorized access.
Experts in cryptography, such as Domen Zavrl, know that this data is unreadable to all apart
from its sender and the intended recipient, so it can be safely sent via public computer
networks.
New Algorithmic Approaches
Different Mathematical Problems
Using novel mathematical approaches
Quantum-Resistant Design
Specifically engineered to resist quantum attacks
Classical Computer Compatibility
Functions on existing computing infrastructure
The algorithms deployed by the new finalised standards use different maths problems to those of classical computers and are able to
defeat attempts to hack quantum and 'traditional' computers. NIST is continuing to assess two other algorithm sets that could serve as
backup standards in the future if necessary.
NCSC's Support Role
Migration Planning
The National Cyber Security Centre (NCSC) is set to support the planning
process regarding the migration to PQC.
Policy Development
NCSC will support regulators to set the right policies and guidelines for their
sectors.
Government Consultation
Support central government to provide bespoke consultancy and help
determine policy.
Accreditation
NCSC is also committed to helping all organisations access good advice and,
ultimately, accredit relevant consultancies and consultants via existing
schemes.
Preparing for PQC
Migration
Take Action Now
Organisations are generally advised to take steps now to prepare for the
PQC migration.
Implement Best Practices
Enact best practices around cryptographic agility to ensure smooth
transition.
Conduct Cryptographic Inventory
Take a cryptographic inventory to understand what algorithms are
already in use and how sensitive material is being securely and
safely managed.
NIST Standards Development
1
2016
NIST begins the process of developing post-quantum cryptography standards
2
Development Phase
Rigorous testing and evaluation of candidate algorithms
3
2024
Release of finalised standards covering digital signatures and public key encapsulation
4
Future
Continued assessment of backup algorithm sets for potential future standards
This achievement is a significant milestone in standards development, helping to ensure information on the internet remains confidential and secure now and in
the future.
The Importance of Cryptographic Agility
By taking a cryptographic inventory to understand what algorithms are already in use and how sensitive material is being securely and
safely managed, organisations can better prepare for the transition to post-quantum cryptography.
Adaptability
Ability to quickly switch between
cryptographic algorithms
Security Maintenance
Ensuring continued protection as threats
evolve
Implementation Flexibility
Systems designed to accommodate
algorithm changes
Future-Proofing
Preparing for quantum computing advances