NIST Post-Quantum Cryptography Standardization: SIKE Bites the Dust

NIST Post-Quantum Cryptography Standardization: SIKE Bites the Dust

Just a month ago, NIST announced its selection of three digital signature algorithms and one key establishment mechanism (KEM) for future use in quantum-resistant cryptography applications. Also, four algorithms for post-quantum key establishment were selected as candidates for the 4th round of evaluation, for potential standardization at a later time.

The NIST Announcement on Quantum-Resistant Cryptography Standards is Out. Act Now!

The NIST Announcement on Quantum-Resistant Cryptography Standards is Out. Act Now!

An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of the NIST Post-Quantum Crypto (PQC) Standardization Process, that is, which quantum-resistant cryptographic algorithms NIST has selected for standardization.

Crypto-Agility: The gold at the end of the Rainbow for NIST PQC Standardization

Crypto-Agility: The gold at the end of the Rainbow for NIST PQC Standardization

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for post-quantum cryptography standards and the importance of future-proofing how we use cryptography to protect data in the advent of quantum computing and beyond.

NIST PQC Finalists Update: It’s Over For The Rainbow

NIST PQC Finalists Update: It’s Over For The Rainbow

Last month, one of the three NIST finalists for post-quantum signature schemes has received its final nail in the coffin: Ward Beullens, a PostDoc at IBM Research, published a practical key recovery attack against the Rainbow signature scheme.

Crypto-Agility in the Advent of Post Quantum Computing

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to threats it will present once it arrives.

Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to standardize post-quantum cryptography (PQC), NIST has begun the process of evaluating several PQC candidates in order to standardize one or more public-key algorithms that are quantum-resistant.

Q&A on Quantum Computing and Cryptography: The Risks Posed and how Crypto-Agility can Help Prepare for it

Q&A on Quantum Computing and Cryptography: The Risks Posed and how Crypto-Agility can Help Prepare for it

While the science and technology behind quantum computers is extremely complex, their computing power has been steadily increasing, from 3 qubits in 1998, to 7 qubits in 2000, to 12 qubits in 2006, and up to 72 qubits in 2018.

Steps to reach crypto agility to get prepared for quantum computing

Steps to reach crypto agility to get prepared for quantum computing

As the scientific community continues to push towards achieving quantum computing on a mass scale, smart companies are busy making preparations for this inevitability. While scientists disagree on whether it's 5 years away or 20 (or more), the reality is that the amount of time that organizations have to prepare is quickly slipping away. These preparations go far beyond just planning for new infrastructure investments. This is especially true for the utilization of encryption and crypto keys. Whether you are just beginning to plan for the quantum future or are well down the path, here are three important steps that will help you achieve crypto-agility and prepare yourself for quantum computing.

Symmetric Encryption Algorithms - Their Strengths and Weaknesses, and the Need for Crypto-Agility

Symmetric Encryption Algorithms - Their Strengths and Weaknesses, and the Need for Crypto-Agility

In this article, the second in a 3-part series on symmetric key encryption technology, we look at the development of symmetric key encryption algorithms and the range of algorithms available today along with their strengths and weaknesses, as well as the importance of crypto-agility.