cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Caute_cautim
Community Champion

Migration to Post-Quantum Cryptography

Hi All

 

The advent of quantum computing technology will compromise many of the current cryptographic algorithms, especially public-key cryptography, which is widely used to protect digital information. Most algorithms on which we depend are used worldwide in components of many different communications, processing, and storage systems. Once access to practical quantum computers becomes available, all public-key algorithms and associated protocols will be vulnerable to criminals, competitors, and other adversaries. It is critical to begin planning for the replacement of hardware, software, and services that use public-key algorithms now so that information is protected from future attacks.

 

https://www.nccoe.nist.gov/crypto-agility-considerations-migrating-post-quantum-cryptographic-algori...

 

Regards

 

Caute_Cautim

4 Replies
Early_Adopter
Community Champion

This is a very good comprehensive into, and as it’s a draft you can compare what changed.
ericgeater
Community Champion

This video alone was worth the click!

Post-Quantum Cryptography: the Good, the Bad, and the Powerful - YouTube

 

Preparete... pero relajete.

-----------
A claim is as good as its veracity.
Kyaw_Myo_Oo
Contributor III

@Caute_cautim thank you for sharing this information with us.

 

 

Kyaw Myo Oo
Manager , CB BANK PCL
CCIE #58769 | PCNSE | SAA-C03 | CCSM | CISSP | PMP
Kyaw_Myo_Oo
Contributor III

@ericgeater Thanks for sharing.

 

 

Kyaw Myo Oo
Manager , CB BANK PCL
CCIE #58769 | PCNSE | SAA-C03 | CCSM | CISSP | PMP