Wednesday, November 20, 2024
Homecyber securityNIST Finalizes 3 Algorithms to Combat Future Quantum Cyber Threats

NIST Finalizes 3 Algorithms to Combat Future Quantum Cyber Threats

Published on

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has taken a step in safeguarding digital security against future quantum threats.

By finalizing a set of three encryption algorithms, NIST aims to protect sensitive information from the potential capabilities of quantum computers, which could break existing encryption methods.

The Journey Toward Quantum-Resistant Algorithms: NIST’s Initiative

In 2015, NIST embarked on a mission to develop quantum-resistant algorithms, anticipating the future capabilities of quantum computers.

- Advertisement - SIEM as a Service

After evaluating 82 algorithms from 25 countries, NIST identified the top candidates with the help of global cryptographers.

These algorithms were refined into finalists and alternatives, leading to draft standards released in 2023.

The finalized standards are ready for implementation, and cybersecurity experts are encouraged to promptly integrate them into their systems. Encryption protects electronic secrets, from personal emails to national security data.

Current encryption relies on complex mathematical problems that conventional computers find difficult to solve.

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

However, a powerful quantum computer could potentially crack these codes quickly. The new algorithms standardized by NIST are designed to resist both conventional and quantum attacks, ensuring robust security for the future.

The Importance of Immediate Implementation

NIST mathematician Dustin Moody, who leads the post-quantum cryptography (PQC) standardization project, emphasized the importance of immediate implementation.

“These finalized standards include instructions for incorporating them into products and encryption systems,” Moody stated.

“We encourage system administrators to start integrating them into their systems immediately because full integration will take time.” The new standards are essential tools for general encryption and digital signature protection.

While NIST continues to evaluate additional sets of algorithms for potential backup standards, the current three are considered the primary defense against future quantum threats.

NIST’s efforts do not stop with the finalization of these three algorithms. The agency also evaluates two other algorithms that could serve as future backups.

One set focuses on general encryption using different mathematical problems, with selections expected by 2024.

The second set includes algorithms for digital signatures, with further evaluations underway. Moody reassured that while additional standards are being developed, the current three algorithms are sufficient for most applications.

“There is no need to wait for future standards,” he said. “Go ahead and start using these three. We need to be prepared in case of an attack that defeats the algorithms in these three standards, and we will continue working on backup plans to keep our data safe.”

As quantum computing technology advances, NIST remains at the forefront of ensuring digital security keeps pace, providing the necessary tools to protect sensitive information in a post-quantum world.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Acces

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Rekoobe Backdoor In Open Directories Possibly Attacking TradingView Users

APT31, using the Rekoobe backdoor, has been observed targeting TradingView, a popular financial platform,...

Water Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting Vulnerabilities

Water Barghest, a sophisticated botnet, exploits vulnerabilities in IoT devices to enlist them in...

North Korean IT Worker Using Weaponized Video Conference Apps To Attack Job Seakers

North Korean IT workers, operating under the cluster CL-STA-0237, have been implicated in recent...

Hackers Hijacked Misconfigured Servers For Live Streaming Sports

Recent threat hunting activities focused on analyzing outbound network traffic and binaries within containerized...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Rekoobe Backdoor In Open Directories Possibly Attacking TradingView Users

APT31, using the Rekoobe backdoor, has been observed targeting TradingView, a popular financial platform,...

Water Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting Vulnerabilities

Water Barghest, a sophisticated botnet, exploits vulnerabilities in IoT devices to enlist them in...

North Korean IT Worker Using Weaponized Video Conference Apps To Attack Job Seakers

North Korean IT workers, operating under the cluster CL-STA-0237, have been implicated in recent...