Connects decision-makers and solutions creators to what's next in quantum computing

NIST Hands Off Post-Quantum Cryptography Work to Cyber Teams

The release of new NIST quantum-proof cryptography standards signals it's time for cybersecurity teams to get serious about preparing for the rise of quantum threats

Becky Bracken, senior editor, Dark Reading

August 27, 2024

1 Min Read
A computer generated imaged of a lock and key with a hand behind
Getty Images

No longer relegated to post-doctorate physics academia and sad Schrödinger's cat thought experiments, post-quantum computing remediation has arrived in the real world.

Quantum computing is expected to emerge in earnest a decade from now, with the power to crack existing public key infrastructure (PKI) cryptography schemes like RSA and the Advanced Encryption Standard (AES). And with NIST's recent release of three final quantum encryption standards, security teams are now racing against that 10-year clock to update vulnerable cryptography before quantum algorithms go into production that are capable of crushing them and unlocking reams of secret data.

With NIST effectively handing off the work of post-quantum encryption remediation planning and execution to cybersecurity teams around the world with the release of the standards, the time is now for rank-and-file cybersecurity professionals to get "hands on" with post-quantum cryptography (PQC), according to Jason Soroko, senior vice president of product at Sectigo.

Read the full story on Enter Quantum's sister publication Dark Reading >>>

About the Author

Becky Bracken

senior editor, Dark Reading, Dark Reading

Becky Bracken is senior editor at Dark Reading.

Sign Up for the Newsletter
The most up-to-date news and insights into the latest emerging technologies ... delivered right to your inbox!

You May Also Like