<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Quantum in Context: IBM Key to New NIST Post-Quantum Crypto Standards in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Quantum-in-Context-IBM-Key-to-New-NIST-Post-Quantum-Crypto/m-p/73144#M7119</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For all the potential of quantum computing to solve problems intractable with today’s classical systems, there has been a shadow hanging over the field since the 1990s. In cryptography, decryption schemes are protected by having authorized people or systems having the keys to unlock encrypted data. These can only be broken by solving some very hard computational problems. In the case of RSA and several other methods, those hard problems involve factoring specific very large numbers into smaller prime numbers.&lt;/P&gt;&lt;P&gt;Peter Shor’s 1995 quantum algorithm shows how to factor numbers almost exponentially faster than any known classical method. However, today’s quantum computers are nowhere near powerful enough to perform these calculations. Nevertheless, we must protect ourselves in the future. The new &lt;A href="https://www.nist.gov/" target="_blank" rel="noopener"&gt;NIST&lt;/A&gt; standards are an excellent start to providing that insurance against quantum computers undoing data encryption. The decades-long strength of &lt;A href="https://www.ibm.com/us-en" target="_blank" rel="noopener"&gt;IBM&lt;/A&gt;’s Research division and its scientific expertise were critical for providing the core algorithms in the standards.&lt;/P&gt;&lt;P&gt;The work to protect our data against quantum attacks is not complete, and NIST should continue to lead the way in developing standards. This is not the time for sovereign or other international efforts to compete. Continued global cooperation and pooling of cryptographic and cybersecurity expertise is critical.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://futurumgroup.com/insights/quantum-in-context-ibm-key-to-new-nist-post-quantum-crypto-standards/" target="_blank"&gt;https://futurumgroup.com/insights/quantum-in-context-ibm-key-to-new-nist-post-quantum-crypto-standards/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Thu, 15 Aug 2024 20:03:30 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-08-15T20:03:30Z</dc:date>
    <item>
      <title>Quantum in Context: IBM Key to New NIST Post-Quantum Crypto Standards</title>
      <link>https://community.isc2.org/t5/Industry-News/Quantum-in-Context-IBM-Key-to-New-NIST-Post-Quantum-Crypto/m-p/73144#M7119</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For all the potential of quantum computing to solve problems intractable with today’s classical systems, there has been a shadow hanging over the field since the 1990s. In cryptography, decryption schemes are protected by having authorized people or systems having the keys to unlock encrypted data. These can only be broken by solving some very hard computational problems. In the case of RSA and several other methods, those hard problems involve factoring specific very large numbers into smaller prime numbers.&lt;/P&gt;&lt;P&gt;Peter Shor’s 1995 quantum algorithm shows how to factor numbers almost exponentially faster than any known classical method. However, today’s quantum computers are nowhere near powerful enough to perform these calculations. Nevertheless, we must protect ourselves in the future. The new &lt;A href="https://www.nist.gov/" target="_blank" rel="noopener"&gt;NIST&lt;/A&gt; standards are an excellent start to providing that insurance against quantum computers undoing data encryption. The decades-long strength of &lt;A href="https://www.ibm.com/us-en" target="_blank" rel="noopener"&gt;IBM&lt;/A&gt;’s Research division and its scientific expertise were critical for providing the core algorithms in the standards.&lt;/P&gt;&lt;P&gt;The work to protect our data against quantum attacks is not complete, and NIST should continue to lead the way in developing standards. This is not the time for sovereign or other international efforts to compete. Continued global cooperation and pooling of cryptographic and cybersecurity expertise is critical.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://futurumgroup.com/insights/quantum-in-context-ibm-key-to-new-nist-post-quantum-crypto-standards/" target="_blank"&gt;https://futurumgroup.com/insights/quantum-in-context-ibm-key-to-new-nist-post-quantum-crypto-standards/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 20:03:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Quantum-in-Context-IBM-Key-to-New-NIST-Post-Quantum-Crypto/m-p/73144#M7119</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-08-15T20:03:30Z</dc:date>
    </item>
  </channel>
</rss>

