
The National Cybersecurity Center of Excellence (NCCoE) released the final version of the NIST Cybersecurity White Paper titled Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms.
What’s this paper about?
Cryptographic technologies are used throughout government and industry to authenticate the source and protect the confidentiality and integrity of information that we communicate and store. From time to time, it is necessary to replace a cryptographic algorithm because of new weaknesses or threats. Progress in the development of quantum computing foreshadows a particularly disruptive cryptographic transition.
Practical quantum computing will break the security of nearly all modern public-key cryptographic systems. New post-quantum cryptographic algorithms which are resistant to quantum computer-based attacks will need to be implemented, but introducing new algorithms requires updates to protocols, schemes, and infrastructures that could take decades to complete.
This paper introduces challenges associated with adopting and using post-quantum cryptography once new algorithms and new standards using them are ready. The paper also discusses the planning for migration to post-quantum cryptography, then concludes with NIST’s next steps for helping with the migration.
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf
Fachartikel
Studien

GMO GlobalSign Umfrage unter Unternehmen und KMUs zeigt, dass viele nicht auf die PKI-Automatisierung vorbereitet sind

Studie: Sicherheitsbedenken bremsen Tech-Innovation aus

Mainframe-Investitionen zeigen signifikante Dynamik in DevOps, AIOps, mit Fokus auf Sicherheit

Forrester-Report: Unzureichende unternehmensweite Kollaboration erschwert Management des externen Cyber-Risikos

BSI will Sicherheit von Open-Source-Software erhöhen
Whitepaper

Incident Response Ransomware Report: KMU am stärksten von Ransomware betroffen

IBM X-Force Report: „Freifahrtschein“ zum Datendiebstahl – Angreifer verwenden gültige Anmeldedaten, um Cloud-Umgebungen zu kompromittieren

Trotz gutem Gehalt: Drei viertel aller IT-Fachkräfte sind wechselbereit

Verizon Business 2023 Payment Security Report: Neue Erkenntnisse zur Optimierung der Zahlungssicherheit
