The agency continues its post-quantum cryptography push as it looks to create guidance for all sectors:
The latest step in post-quantum cryptography guidance is helping organizations identify where current public-key algorithms will need to be replaced, as the National Institute of Standards and Technology continues its push to fortify U.S. digital networks ahead of the maturity of quantum computing.
A new draft document previews—and solicits public commentary on—NIST's current post-quantum cryptography guidance.
Current goals outlined in the working draft include helping entities locate where and how public key algorithms are utilized in encryption schemes, developing a strategy to migrate these algorithms to quantum-resilient substitutes and performing interoperability and performance testing.
[...] A major theme of the document is to help organizations understand the security architecture in their networks so that they firmly grasp where post-quantum security measures will need to be implemented and where to prioritize modernization. NIST also aims to compile a definitive inventory of software vendors to support post-quantum cryptography migration.
[...] The new guidance follows NIST's ongoing effort to finalize its quantum-resistant algorithms in 2024 after identifying four in 2022.
Originally spotted on Schneier on Security.
Related: 2023 Will See Renewed Focus on Quantum Computing
(Score: 4, Insightful) by maxwell demon on Saturday May 06, @05:03AM
The question is, of course, whether the data is still relevant at that time. That of course depends on what you are doing. If you are a journalist who needs to protect your sources, decryption even in 20 years matters a lot. If the secret you're protecting is your password, that information will be obsolete as soon as you change your password, or delete whatever that password was used for.
The Tao of math: The numbers you can count are not the real numbers.