Is Cryptographic Agility The Solution?

IBM Bee Logo

In the next ten years, the notion of quantum supremacy will have likely been attained, and further, quantum computing will have begun to crack data encryption of the prolific types in use today. Ten years. Who knows of this impending shift from “security” to seemingly instant “insecurity”? Even data encrypted today, last week, 3 years ago, etc., will be vulnerable to decryption. Is anyone listening? Ten years, if predictions hold firm. There are some industry leaders – IBM, for one – which believe the time before quantum supremacy and its deleterious effects upon encryption are a mere 5 years in the offing. This piece explains the concept of cryptographic agility and why we, as a society, must get moving to switch to post-quantum cryptographic methods. 

Cryptographic Agility. The team at CIGI has put together this report on solutions to the cryptographic crisis which is starting to loom ahead in the not-too-distant future.

This report is found at Centre for International Governance Innovation…

 

Share this article ...

Our Mission

At The Qubit Report, our mission is to promote knowledge and opinion of quantum computing from the casual reader to the scientifically astute.  Because Quantum is Coming.

Einstein Stroll