Migrating to post-quantum cryptography
In 2020, the NCSC published a white paper on https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptography” target=”_self”>Preparing for Quantum-Safe Cryptography. This paper explained the threat that a possible future quantum computer – one much larger, and much more capable, than any that exist today – would pose to a large class of widely deployed cryptography. That cryptography is known as public-key cryptography (PKC). PKC is the enabling technology for secure communication at scale, on the internet and many other networks.
The same white paper also explains why NCSC’s recommended mitigation of the quantum computing threat is quantum-safe cryptography, or post-quantum cryptography (PQC). PQC is cryptography that is resistant to attack by quantum computers, and also to today’s digital, or classical, computers. Furthermore, PQC offers broadly equivalent functionality to the quantum-vulnerable PKC currently in use, and can be deployed in many of today’s devices (including PCs, smartphones etc.) with a software update.
This seems like a simple solution to the threat from a potentially disruptive technology. And conceptually, it is – but the migration to PQC is a very complicated undertaking. This blog explains why.
Original Source: ncsc[.]gov[.]uk
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.