Preparing for Post-Quantum Cryptography

0
273
5 Common Interview Questions and How to Respond

Dit bericht verscheen eerder bij FOSSlife

Scientists generally agree that “quantum computers will be able to break widely used public-key cryptographic schemes when they come into being,” says the European Union Agency for Cybersecurity (ENISA). 

The transition to “quantum-resistant cryptographic algorithms is expected to take years due to the complex processes and financial costs,” ENISA notes. However, governments and organizations need to anticipate the rise of quantum capabilities and prepare for resulting changes.

A new report from ENISA “answers the difficult questions raised by post-quantum cryptography in order to make sure we will avoid jeopardising today’s public key cryptosystems, e-commerce, digital signatures, electronic identities, etc.” 

It also offers technical recommendations, such as:

  • Developing guidelines for major use cases to assess trade-offs 
  • The use of hybrid systems, where post-quantum cryptography is layered on top of pre-quantum cryptography.

Learn more at ENISA.

Dit bericht verscheen eerder bij FOSSlife

Vorig artikelGoogle Offers 5 Core Principles for IoT Security Labeling
Volgend artikelDennis de Vries is VP Strategic Alliances bij AFIBER