CISA's Post-Quantum Cryptography Initiative

Critical infrastructure systems use electronic digital communications to transmit data and store info. To secure the data in transit, cryptographic technologies are used to authenticate the source and protect the confidentiality and integrity of communicated and stored information. But as quantum computing advances over the next decade, it is increasing risk to certain widely used encryption methods. 

The disruptive promise of scaled quantum computing comes with a threat to the security of many of our most widely used crypto-graphic algorithms.

Now, the US Cybersecurity and Infrastructure Security Agency (CISA) has announced the establishment of a Post-Quantum Cryptography Initiative to unify and drive agency efforts to address threats posed by quantum computing. This is because nation-states and private companies are actively pursuing the capabilities of quantum computers.

Quantum computing opens up exciting new possibilitie. However, the consequences of this new technology include threats to the current cryptographic standards that ensure data confidentiality and integrity and support key elements of network security. One of the first things a company needs is an understanding of its current cryptography, to identify systems and software that will need to be upgraded or replaced with post-quantum cryptography. “Post-quantum crypto-graphy is about proactively developing and building capabilities to secure critical information and systems from being compromised through the use of quantum computers,” comments Rob Joyce, Director Cybersecurity at the US National Security Agency (NSA).

The transition to a secured quantum computing era is a long-term intensive community effort that will require extensive collaboration between government and industry. "The key is to be on this journey today and not wait until the last minute." according to Joyce.

While quantum computing technology capable of breaking public key encryption algorithms in the current standards does not yet exist, government and critical infrastructure entities, including both public and private organisations, must work together to prepare for a new post-quantum crypto-graphic standard to defend against future threats.

CISA:     DHS:     CISA:     Homeland Security Today:     Business Wire:     VM Ware:    

The Quantum Insider       Image: xresch

You Might Also Read: 

Special Measures To Deal With Quantum Technology:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Iranian Spyware Exposed
An 8% Spike In Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Santa Monica Networks (SMN)

Santa Monica Networks (SMN)

Santa Monica Networks specializes in providing secure solutions for data networks and data centers.

Roke Manor Research

Roke Manor Research

Roke Manor Research is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

SkOUT Secure Intelligence

SkOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

GB Group (GBG)

GB Group (GBG)

GBG is a global technology specialist in fraud, location and identity data intelligence.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

HancomWITH

HancomWITH

HancomWITH is a World-Leading Mobile and Digital Forensic Research Group. We provide a one-stop forensic service for law firms, audit, and eDiscovery corporations.

Scarlett Cybersecurity

Scarlett Cybersecurity

Scarlett Cybersecurity provide cybersecurity services to US private and public organizations with specific emphasis on compliance and cybersecurity incident prevention, detection, and response.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.