<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New standards to protect data from quantum hackers in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/New-standards-to-protect-data-from-quantum-hackers/m-p/73206#M7126</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sysadmins urged to implement new security standards "immediately".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The world’s ICT industry is on notice to update widely used data encryption technologies after the finalisation of post quantum computing (PQC) algorithms designed to prevent powerful new quantum computers from decrypting sensitive personal, business, and government data.&lt;/P&gt;&lt;P&gt;Developed with industry and researchers through an &lt;A href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank"&gt;eight-year effort&lt;/A&gt; managed by the US National Institute of Standards and Technology (NIST), the &lt;A href="https://www.federalregister.gov/documents/2024/08/14/2024-17956/announcing-issuance-of-federal-information-processing-standards-fips-fips-203-module-lattice-based" target="_blank"&gt;three new standards&lt;/A&gt; – which NIST references as ML-KEM (&lt;A href="https://csrc.nist.gov/pubs/fips/205/final" target="_blank"&gt;FIPS 203&lt;/A&gt;), ML-DSA (&lt;A href="https://csrc.nist.gov/pubs/fips/204/final" target="_blank"&gt;FIPS 204&lt;/A&gt;), and SLH-DSA (&lt;A href="https://csrc.nist.gov/pubs/fips/203/final" target="_blank"&gt;FIPS 205&lt;/A&gt;) – are the result of a competitive process that began in 2016.&lt;/P&gt;&lt;P&gt;Anticipating the eventual development of large-scale cryptographically relevant quantum computers (CRQCs), NIST &lt;A href="https://www.nist.gov/news-events/news/2016/12/nist-asks-public-help-future-proof-electronic-information" target="_blank"&gt;asked&lt;/A&gt; the world’s cryptographic researchers to submit candidates to replace the existing &lt;A href="http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf" target="_blank"&gt;FIPS 186-4&lt;/A&gt;, &lt;A href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar2.pdf" target="_blank"&gt;NIST SP 800-56A&lt;/A&gt; and &lt;A href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br1.pdf" target="_blank"&gt;NIST SP 800-56B&lt;/A&gt; standards – all of which are vulnerable because they protect data using &lt;A href="https://en.wikipedia.org/wiki/Public-key_cryptography" target="_blank"&gt;public key cryptography&lt;/A&gt; (PKC).&lt;/P&gt;&lt;P&gt;PKC’s security relies on long encryption ‘keys’ that are used to encrypt your web browsing, online banking, e-commerce purchases, submission of personal data, secure messaging, social media, email, and phone calls – as well as weightier data like company customer databases, intellectual property stores, and national security information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://ia.acs.org.au/article/2024/new-standards-to-protect-data-from-quantum-hackers.html" target="_blank"&gt;https://ia.acs.org.au/article/2024/new-standards-to-protect-data-from-quantum-hackers.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 18 Aug 2024 20:27:20 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-08-18T20:27:20Z</dc:date>
    <item>
      <title>New standards to protect data from quantum hackers</title>
      <link>https://community.isc2.org/t5/Industry-News/New-standards-to-protect-data-from-quantum-hackers/m-p/73206#M7126</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sysadmins urged to implement new security standards "immediately".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The world’s ICT industry is on notice to update widely used data encryption technologies after the finalisation of post quantum computing (PQC) algorithms designed to prevent powerful new quantum computers from decrypting sensitive personal, business, and government data.&lt;/P&gt;&lt;P&gt;Developed with industry and researchers through an &lt;A href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank"&gt;eight-year effort&lt;/A&gt; managed by the US National Institute of Standards and Technology (NIST), the &lt;A href="https://www.federalregister.gov/documents/2024/08/14/2024-17956/announcing-issuance-of-federal-information-processing-standards-fips-fips-203-module-lattice-based" target="_blank"&gt;three new standards&lt;/A&gt; – which NIST references as ML-KEM (&lt;A href="https://csrc.nist.gov/pubs/fips/205/final" target="_blank"&gt;FIPS 203&lt;/A&gt;), ML-DSA (&lt;A href="https://csrc.nist.gov/pubs/fips/204/final" target="_blank"&gt;FIPS 204&lt;/A&gt;), and SLH-DSA (&lt;A href="https://csrc.nist.gov/pubs/fips/203/final" target="_blank"&gt;FIPS 205&lt;/A&gt;) – are the result of a competitive process that began in 2016.&lt;/P&gt;&lt;P&gt;Anticipating the eventual development of large-scale cryptographically relevant quantum computers (CRQCs), NIST &lt;A href="https://www.nist.gov/news-events/news/2016/12/nist-asks-public-help-future-proof-electronic-information" target="_blank"&gt;asked&lt;/A&gt; the world’s cryptographic researchers to submit candidates to replace the existing &lt;A href="http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf" target="_blank"&gt;FIPS 186-4&lt;/A&gt;, &lt;A href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar2.pdf" target="_blank"&gt;NIST SP 800-56A&lt;/A&gt; and &lt;A href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Br1.pdf" target="_blank"&gt;NIST SP 800-56B&lt;/A&gt; standards – all of which are vulnerable because they protect data using &lt;A href="https://en.wikipedia.org/wiki/Public-key_cryptography" target="_blank"&gt;public key cryptography&lt;/A&gt; (PKC).&lt;/P&gt;&lt;P&gt;PKC’s security relies on long encryption ‘keys’ that are used to encrypt your web browsing, online banking, e-commerce purchases, submission of personal data, secure messaging, social media, email, and phone calls – as well as weightier data like company customer databases, intellectual property stores, and national security information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://ia.acs.org.au/article/2024/new-standards-to-protect-data-from-quantum-hackers.html" target="_blank"&gt;https://ia.acs.org.au/article/2024/new-standards-to-protect-data-from-quantum-hackers.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2024 20:27:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/New-standards-to-protect-data-from-quantum-hackers/m-p/73206#M7126</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-08-18T20:27:20Z</dc:date>
    </item>
  </channel>
</rss>

