HomeCII/OTNIST Releases Initial Draft Standards for Post-Quantum Cryptography

NIST Releases Initial Draft Standards for Post-Quantum Cryptography

Published on

spot_img

The National Institute for Standards and Technology (NIST) has released the first draft of standards for quantum-resistant public key cryptography. These standards are based on algorithms chosen by NIST and will serve as a defense against potential attacks from quantum computers. NIST published three of the four algorithms selected last year, including Crystals-Kyber, Crystals-Dilithium, and Sphynx+. These algorithms will be known as ML-KEM, ML-DSA, and SLH-DSA, respectively. The fourth algorithm, Falcon, will be published as a draft standard early next year due to its complexity.

The publication of these draft standards is a significant milestone in NIST’s effort to address the vulnerability of current encryption methods to quantum computers. Quantum computers have the potential to break existing RSA encryption and elliptic-curve cryptography, which has raised concerns about the security of sensitive data.

The release of the draft standards opens a 90-day period for public comment. Dustin Moody, a mathematician at NIST, who leads the PQC standardization project, expects to make any necessary changes based on the feedback received during this period. The finalized versions of the standards will be published after this process is complete.

The release of the draft standards also allows engineers to start working on prototypes using these algorithms. Tim Hollebeek, an industry and technical standards strategist at DigiCert, highlights the importance of interoperability in the implementation of these algorithms. The Internet Engineering Task Force (IETF) will now focus on ensuring that different implementations of the protocols work correctly with each other.

To test the interoperability of the PQC draft standards, stakeholders will participate in hackathons before the next IETF meeting in Prague. This collaborative effort aims to identify any potential issues or ambiguities in the standards.

In addition to the four algorithms included in the draft standards, NIST has also issued a call for additional digital signature proposals. These proposals should not be based on structured lattices and should outperform Dilithium and Falcon.

The concerns about quantum computers breaking current encryption methods date back to 1994 when MIT professor Peter Shor presented his quantum computing algorithm. Quantum computers use qubits, which are subatomic particles that enable complex calculations. While it is difficult to predict when commercially viable quantum computers will emerge, many experts believe that this capability may surface within the next decade.

Despite the uncertainties surrounding the timeline for quantum computing, the need for quantum-resistant encryption is becoming increasingly urgent. The National Security Agency (NSA) shares these concerns and has announced a migration path from current encryption algorithms to NIST-approved quantum-resistant algorithms. The US President, Joe Biden, also signed the Quantum Computing Cybersecurity Preparedness Act, which directs government agencies to implement these standards.

Ensuring a smooth transition to quantum-resistant cryptography is crucial, and NIST is working to facilitate this migration as quickly as possible. While the process may take longer than expected, the goal is to ensure that agencies are adopting quantum-resistant algorithms to safeguard sensitive data from potential quantum computer attacks by 2035.

In conclusion, the release of the draft standards for quantum-resistant public key cryptography is an important step towards addressing the potential threat posed by quantum computers. With the involvement of various stakeholders and the commitment to interoperability, the development and implementation of these standards will help secure sensitive information in the face of evolving technology.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...