Enigma Rotor Set

Always good to take a step back and look at the basics. Recommend reading from the source, below. Because Quantum is Coming. Qubit

What is Post-Quantum Cryptography?

Read More…

+  What is post-quantum cryptography (PQC) and why is it important?  Post-quantum cryptography is centered around the algorithms that are designed to secure data in the age of quantum computing and beyond.

+  It’s key that we develop these cryptography algorithms and purpose-built hardware cryptographic engines, as processing these algorithms in software may be too slow for certain high-throughput networking equipment.

+  The new algorithms could be much more computationally intensive than our existing standards, including RSA and ECC, specifically if their implementations need to be protected against side-channel attacks.

The term quantum computing brings images of futuristic super computers along the lines of Star Trek. Quantum computing is still in its infancy, but it’s growing rapidly and the implications of its capabilities is significant especially in the realm of security.

+  What work is being done to ensure that our devices and data remain secured?  The National Institute of Standards and Technology (NIST) is sponsoring a competition to find, evaluate, and standardize a public-key cryptographic algorithm (or algorithms) that will stand up to the challenges posed by quantum computers.

+  The second round of 26 contestants was narrowed down in the recent announcement of the third-round finalists and alternates, and the final portfolio is expected to be announced sometime in 2022.

+  If we’re still so far away from quantum computers being a reality, why is there such a sense of urgency to get moving on this now?

+  It takes time to test and determine whether an algorithm will be able to withstand the force of a quantum-computer attack. Additionally, designers need time to implement the chosen algorithm standard(s) into their products, and this lead time can be as much as a couple of years for new products and up to 10 years for networking infrastructures and networking protocols.

Source:  Electronic Design.  Helena Handschuh,  What is Post-Quantum Cryptography?

Content may have been edited for style and clarity. The “+” to the left of paragraphs or other statements indicates quoted material from “Source:” document. Boldface title is original title from “Source:” Italicized statements are directly quoted from “Source:” document. Image sources are indicated as applicable.