<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PQC Post Quantum Cryptography latest update in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/PQC-Post-Quantum-Cryptography-latest-update/m-p/76899#M7371</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Updates on Post Quantum Cryptography (PQC)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;The US government pushes for PQC adoption and extensive use of cryptography.&lt;BR /&gt;&lt;BR /&gt;On Jan. 16th, 2025, the Biden administration published the "Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity" (EO 14144). The Trump administration revoked several Biden Executive Orders on the inauguration day, but this EO was not one of them.&lt;BR /&gt;&lt;BR /&gt;This EO shows near-future requirements by US agencies to their vendors. These requirements may permeate to the financial sector as requisites from US agencies to their providers or as features that will be more relevant in major technology products and offerings. It also shows interesting trends on actions that may need to be prioritized.&lt;BR /&gt;&lt;BR /&gt;The EO focuses on making cybersecurity controls effective to avoid organizations and the supply chain to comply minimally with no impact in improving security. It seeks accountability of software and cloud services providers.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_right:"&gt;👉&lt;/span&gt; Highlights on cryptography&lt;BR /&gt;There are several requirements promoting the use of cryptography and accelerating the transition to PQC:&lt;BR /&gt;✔ Use of public-key cryptography to implement phishing-resistant authentication.&lt;BR /&gt;✔ Implement Internet routing protections to defend against malicious traffic diversions&lt;BR /&gt;✔ Implement cryptography-protected DNS, email, voice, video conference and instant messaging.&lt;BR /&gt;✔ Implement PQC "as soon as practicable".&lt;BR /&gt;✔ Improve key management onprem and in the cloud.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt; Introducing or improving cryptography in various processes and protocols.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt; Protecting Internet traffic routing, as it is a first step for HNDL attacks.&lt;BR /&gt;&lt;BR /&gt;More details:&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; The order highlights “the People’s Republic of China presenting the most active and persistent cyber threat” to the US.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Use of Route Origin Authorizations and performing Route Origin Validation filtering.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; NIST to publish updated guidance on BGP security methods, route leak mitigation and source address validation.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Encrypted DNS must be deployed wherever supported.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Email messages must be encrypted in transport and, where practical, use end-to-end encryption.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Expand the use of authenticated transport-layer encryption between email servers and with clients.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Voice, VC and IM must enable transport encryption and use end-to-end encryption by default.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Implement PQC key establishment or hybrid key establishment including a PQC algorithm as soon as practicable upon support from the vendors.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Support TLSv1.3 ASAP but no later than 2029.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Cryptographic keys with extended life-cycles should be protected with HSMs, TEEs, etc.&lt;BR /&gt;&lt;BR /&gt;Executive order: &lt;A class="" href="https://lnkd.in/d-ifZtrf" target="_self"&gt;https://lnkd.in/d-ifZtrf&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;A class="" href="https://www.linkedin.com/company/nist/" target="_self"&gt;National Institute of Standards and Technology (NIST)&lt;/A&gt; responsibilities: &lt;A class="" href="https://lnkd.in/dnhUbrfH" target="_self"&gt;https://lnkd.in/dnhUbrfH&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Thanks to Jaime Gomez Garcia &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;&amp;nbsp;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 06 Feb 2025 21:26:25 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2025-02-06T21:26:25Z</dc:date>
    <item>
      <title>PQC Post Quantum Cryptography latest update</title>
      <link>https://community.isc2.org/t5/Industry-News/PQC-Post-Quantum-Cryptography-latest-update/m-p/76899#M7371</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Updates on Post Quantum Cryptography (PQC)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;The US government pushes for PQC adoption and extensive use of cryptography.&lt;BR /&gt;&lt;BR /&gt;On Jan. 16th, 2025, the Biden administration published the "Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity" (EO 14144). The Trump administration revoked several Biden Executive Orders on the inauguration day, but this EO was not one of them.&lt;BR /&gt;&lt;BR /&gt;This EO shows near-future requirements by US agencies to their vendors. These requirements may permeate to the financial sector as requisites from US agencies to their providers or as features that will be more relevant in major technology products and offerings. It also shows interesting trends on actions that may need to be prioritized.&lt;BR /&gt;&lt;BR /&gt;The EO focuses on making cybersecurity controls effective to avoid organizations and the supply chain to comply minimally with no impact in improving security. It seeks accountability of software and cloud services providers.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_right:"&gt;👉&lt;/span&gt; Highlights on cryptography&lt;BR /&gt;There are several requirements promoting the use of cryptography and accelerating the transition to PQC:&lt;BR /&gt;✔ Use of public-key cryptography to implement phishing-resistant authentication.&lt;BR /&gt;✔ Implement Internet routing protections to defend against malicious traffic diversions&lt;BR /&gt;✔ Implement cryptography-protected DNS, email, voice, video conference and instant messaging.&lt;BR /&gt;✔ Implement PQC "as soon as practicable".&lt;BR /&gt;✔ Improve key management onprem and in the cloud.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt; Introducing or improving cryptography in various processes and protocols.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt; Protecting Internet traffic routing, as it is a first step for HNDL attacks.&lt;BR /&gt;&lt;BR /&gt;More details:&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; The order highlights “the People’s Republic of China presenting the most active and persistent cyber threat” to the US.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Use of Route Origin Authorizations and performing Route Origin Validation filtering.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; NIST to publish updated guidance on BGP security methods, route leak mitigation and source address validation.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Encrypted DNS must be deployed wherever supported.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Email messages must be encrypted in transport and, where practical, use end-to-end encryption.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Expand the use of authenticated transport-layer encryption between email servers and with clients.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Voice, VC and IM must enable transport encryption and use end-to-end encryption by default.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Implement PQC key establishment or hybrid key establishment including a PQC algorithm as soon as practicable upon support from the vendors.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Support TLSv1.3 ASAP but no later than 2029.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Cryptographic keys with extended life-cycles should be protected with HSMs, TEEs, etc.&lt;BR /&gt;&lt;BR /&gt;Executive order: &lt;A class="" href="https://lnkd.in/d-ifZtrf" target="_self"&gt;https://lnkd.in/d-ifZtrf&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;A class="" href="https://www.linkedin.com/company/nist/" target="_self"&gt;National Institute of Standards and Technology (NIST)&lt;/A&gt; responsibilities: &lt;A class="" href="https://lnkd.in/dnhUbrfH" target="_self"&gt;https://lnkd.in/dnhUbrfH&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Thanks to Jaime Gomez Garcia &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;&amp;nbsp;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2025 21:26:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/PQC-Post-Quantum-Cryptography-latest-update/m-p/76899#M7371</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2025-02-06T21:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: PQC Post Quantum Cryptography latest update</title>
      <link>https://community.isc2.org/t5/Industry-News/PQC-Post-Quantum-Cryptography-latest-update/m-p/76950#M7375</link>
      <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Feb 2025 15:41:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/PQC-Post-Quantum-Cryptography-latest-update/m-p/76950#M7375</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2025-02-08T15:41:03Z</dc:date>
    </item>
  </channel>
</rss>

