HomeRisk ManagementsNCSC sets a Deadline for Post-Quantum Cryptography Migration to 2035

NCSC sets a Deadline for Post-Quantum Cryptography Migration to 2035

Published on

spot_img

The UK’s National Cyber Security Centre (NCSC) has recently issued a call to action for organizations to transition their systems, services, and products to post-quantum cryptography (PQC) by the year 2035. This move comes in anticipation of the potential risks posed by quantum computers in the future.

The guidance provided by the NCSC outlines a structured three-phase approach to migrating to PQC. This method aims to ensure a smooth and controlled transition, minimizing the risk of rushed implementation and any resulting security gaps. The goal is to safeguard sensitive information against emerging threats posed by quantum computing.

The agency’s chief technical officer, Ollie Whitehouse, emphasized the importance of adapting to new encryption methods in response to the impending revolution in technology brought about by quantum computing. Whitehouse stressed the need for organizations to secure their data against future vulnerabilities to maintain the confidentiality of information in the years to come.

The timeline set forth by the NCSC for the adoption of PQC spans a 10-year period, allowing organizations sufficient time to fully transition to the new encryption standards. The standardization of PQC algorithms by the US National Institute of Standards and Technology in 2024 marked a significant milestone in this process, paving the way for further developments in the field.

The guidance outlines specific objectives for each phase of the migration process:

– Discovery and Assessment (2028): Organizations are expected to create an initial migration plan within the next two to three years, identifying priority migration activities, dependencies on suppliers, required investments, and the need to migrate any hardware roots of trust.

– Execute High Priority Upgrades and Refine Plans (2031): Over the ensuing two to three years, organizations should focus on completing priority migration activities to protect critical assets and preparing their infrastructure to support PQC. Refinements to the migration plan should be made to ensure a clear path to full migration by 2035.

– Complete PQC Migration (2035): In the following four years, organizations are tasked with implementing the migration plan, incorporating new cryptographic technologies, and enhancing overall cyber resilience in their systems.

The significance of adopting PQC as a cybersecurity priority cannot be overstated, especially in light of the threats posed by future quantum computers capable of breaching current encryption protocols. Cybercriminals are already leveraging advanced technologies to harvest data for future decryption, underscoring the urgency of transitioning to quantum-secure solutions.

Recent advancements in quantum computing, such as Microsoft’s unveiling of the world’s first quantum chip, Majorana 1, highlight the rapid progress in this field. With the finalization of NIST PQC Standards in 2024, vendors have made significant strides in developing quantum-secure solutions, with support for PQC algorithms integrated into popular internet browsers and cloud services.

Overall, the NCSC’s guidance on migrating to post-quantum cryptography addresses a critical need for organizations to adapt to evolving cybersecurity threats and protect sensitive information in the digital age. By following the recommended timeline and implementing robust encryption standards, businesses can enhance their security posture and mitigate the risks associated with quantum computing advancements.

Source link

Latest articles

Hackers demand $10 million from Malaysia Airports Holding Berhad

Malaysia Airports Holdings Berhad (MAHB) recently fell victim to a cyberattack, with hackers demanding...

How data ends up on the dark web

The dark web, a hidden part of the internet that allows individuals to remain...

Ukrainian hacker group claims responsibility for extended disruption of Russian internet provider

A cyberattack orchestrated by the Ukrainian volunteer hacker group known as the IT Army...

War Plan Chat Involves Journalist

In a surprising turn of events, journalists found themselves privy to online discussions regarding...

More like this

Hackers demand $10 million from Malaysia Airports Holding Berhad

Malaysia Airports Holdings Berhad (MAHB) recently fell victim to a cyberattack, with hackers demanding...

How data ends up on the dark web

The dark web, a hidden part of the internet that allows individuals to remain...

Ukrainian hacker group claims responsibility for extended disruption of Russian internet provider

A cyberattack orchestrated by the Ukrainian volunteer hacker group known as the IT Army...