Adopting Quantum Cryptography: Why Y2Q Will Be Too Late – Security Boulevard

Advertisement

BEGIN ARTICLE PREVIEW:


 Standards bodies, government organizations and research centers are weighing in on preparing for the threat that quantum computers pose to encryption. The latest from the National Institute of Standards and Technology (NIST): “The race to protect sensitive electronic information against the threat of quantum computers has entered the home stretch.”The institute has been in the process of evaluating and standardizing quantum-safe algorithms for key establishment and digital signatures. NIST recently selected the final round of post-quantum cryptography candidates and plans to release the initial standard for quantum-resistant cryptography in 2022, saying that Round 3 will last 12 to 18 months. When it comes to migration, that’s a blink of an eye!“Anyone that wants to make sure that their data is protected for longer than 10 years should move to alternate forms of encryption now,” warned Arvind Krishna, director of IBM Research, in a ZDNet article. Quantum computers will be able to break the asymmetric encryption and signature algorithms we currently rely on in our networks and security infrastructure. Most experts project that a large-scale quantum computer capable of breaking our encryption will be built sometime within the next seven to 15 years. Meanwhile, Google and IBM both claim they can build quantum computers …

END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE