This post is also available in: עברית (Hebrew)
Following the White House’s warning of potential security risks posed by quantum computers, the National Institute of Standards and Technology (NIST), has highlighted 4 ‘quantum resistant’ cryptographic algorithms that are meant to protect sensitive data. Since advanced quantum computers could potentially crack complicated encryption, this situation calls for new methods of protecting the most sensitive information in the world.
“Research shows that at some point in the not-too-distant future when quantum information science matures and quantum computers are able to reach a sufficient size and level of sophistication, they’ll be capable of breaking much of the cryptography that currently secures our digital communication,” a senior administration official told reporters.
Breakingdefense.com reports that NIST picked the CRYSTALS-Kyber algorithm for general encryption, used when accessing secure websites, and CRYSTALS-Dilithium, FALCON and SPHINCS+ algorithms, used when needing to verify identities during a digital transaction or signing a document remotely.
The problem is that implementing these algorithms throughout federal agencies and private companies is a huge task, especially since many of them still require testing. Despite this, we need to start somewhere. Maybe this will be the new standard method for securing sensitive data and protecting it from malicious cyberattacks, especially those coming from quantum computers.