Quantum Cryptography Series, Explanations. Keeping ourselves reminded, or perhaps getting a first dose of what quantum computing, cybersecurity, and quantum cryptography all have in common, is becoming a necessity in the cybersecurity world. The U.S. National Institute of Standards and Technology (NIST) is working diligently on post-quantum cryptography.
What is this? When quantum computers become sufficiently capable at computing, the likelihood that privacy, confidentiality, and integrity of encrypted data will become vulnerable to revealing the contents is quite high. To better understand the issues surrounding these aspects, Privacy News Online has produced a series of discussions covering the topic. The four parts and their links are below.
NIST Round 2 and Post-Quantum Cryptography (part 1)
NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)
NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)
NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms
Well worth the read. Because quantum is coming. Qubit.