August 28th, 2024

What Is Post-Quantum Cryptography? – NIST

Post-quantum cryptography aims to secure data against quantum computer threats. NIST is developing standards for algorithms resistant to quantum attacks, ensuring protection for sensitive information in the future.

Read original articleLink Icon
What Is Post-Quantum Cryptography? – NIST

Post-quantum cryptography (PQC) refers to encryption methods designed to secure data against potential threats posed by quantum computers, which could break traditional encryption algorithms. NIST is spearheading global efforts to develop and standardize PQC algorithms that are resistant to both classical and quantum attacks. Current encryption relies on the difficulty of factoring large numbers, a task that quantum computers could perform much more efficiently. To counter this, PQC algorithms utilize mathematical problems, such as structured lattices and hash functions, which are believed to be difficult for quantum computers to solve. NIST's initiative began in 2015, leading to the evaluation of numerous algorithms, with the aim of creating standards that can be integrated into various systems over the next decade. The urgency for PQC arises from the potential for adversaries to collect encrypted data now and decrypt it later when quantum computers become available. NIST's standards will be publicly available and are intended for widespread adoption, ensuring that both government and private sectors can protect sensitive information against future quantum threats.

- Post-quantum cryptography aims to secure data against quantum computer attacks.

- NIST is leading the development and standardization of PQC algorithms.

- Current encryption methods may be vulnerable to quantum computing capabilities.

- PQC algorithms are based on complex mathematical problems resistant to quantum attacks.

- The transition to PQC is essential to protect data from future quantum threats.

Link Icon 6 comments
By @alphazard - 5 months
Dan Bernstein (look him up, you already use a lot of his cryptography) recommends Streamlined NTRU Prime.

https://libntruprime.cr.yp.to/

By @shoggouth - 5 months
In case anyone wants to check out NTRU.

"NTRU encryption algorithm, is an NTRU lattice-based alternative to RSA and elliptic curve cryptography (ECC) and is based on the shortest vector problem in a lattice (which is not known to be breakable using quantum computers)."[0]

[0]: https://en.wikipedia.org/wiki/NTRUEncrypt

By @lokimedes - 5 months
I would like to add PQE to our WebRTC E2EE system, have anyone here dine that?
By @cj - 5 months
I was watching a WW2 documentary yesterday and learned Nazi Germany’s encryption had already been (mostly) cracked by the time they entered the war, which (don’t quote me) significantly influenced the outcome of the war. They thought their communications were encrypted, but that was a false belief.

It got me thinking. Once someone truly does break current gen encryption via quantum or otherwise, how much time would go by before it is made known to the public that the encryption is broken?

It seems the safest path forward is to assume encryption is broken and move to post-quantum crypto before we “need” to.

By @ilove196884 - 5 months
PQC is a proposal based on aggressive scaling of quantum computers however looking at the manufacturing end of it (mainly IMEC and PSI) that doesn't seem to be the case. Heck the chinese government doesn't think that aes-256 will be broken by quantum computers till atleast 2100.I wonder which vendor convinced NIST to go ahead with PQC because the hype is plain fear mongering.
By @kidme5 - 5 months
The quantum "threat" is a great excuse to get everyone to adopt new backdoors. If you use these it better be enveloped in a more trustworthy encryption.