06 Sep 2022 2 min read

“Algorithmic Warfare: the growth of new Post-Quantum Algorithms”

Meridith Roaten / National Defense / 6 September 2022

QuSecure is excited to feature in an article by National Defense. The article covers the growth of new algorithms in cybersecurity, especially the new and growing field of post-quantum cryptography (PQC) algorithms.

Key points of the article include:

  • Quantum technology is expected to create a seismic shift in the world of cryptography due to its extraordinary computing power, which will allow quantum computers to crack many modern encryption methods. This has led to a search for new encryption methods which are not vulnerable to quantum computers, known as quantum-resilient algorithms.
  • The National Institute of Standards and Technology, NIST, recently announced it had completed a search for new algorithms to become the future standard for PQC. They selected four algorithms as finalists, and chose one, CRYSTALS-Kyber, as the frontrunner candidate for future standardization.
  • The finalist algorithms use a variety of encryption methods. This is so that any weaknesses discovered in the algorithms are not shared across the entire space of PQC encryption. In addition, NIST will continue to monitor the security of these algorithms to ensure they are unbreakable. QuSecure’s PQC solution is crypto-agile, meaning it can operate with any of the finalist algorithms, and can adapt to new algorithms as they appear.

QuSecure would especially like to highlight a quote from Pete Ford, our head of federal operations. Speaking about the need to quickly adapt to post-quantum cryptography, he said “We really appreciate the freedom that our information technology allows us. When that’s taken away, it’ll be really hard to capture that freedom back.” If organizations are able to move to PQC methods before quantum computers crack encryption, it would allow our current high-security infrastructure to continue. If not, there could be potentially catastrophic data breaches across the entirety of the internet.

Read National Defense’s full article here.

SHARE ARTICLE

Are you ready? Contact us today.

Find out more