Thursday, December 5, 2024
Homecyber securityNIST Finalizes 3 Algorithms to Combat Future Quantum Cyber Threats

NIST Finalizes 3 Algorithms to Combat Future Quantum Cyber Threats

Published on

SIEM as a Service

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has taken a step in safeguarding digital security against future quantum threats.

By finalizing a set of three encryption algorithms, NIST aims to protect sensitive information from the potential capabilities of quantum computers, which could break existing encryption methods.

The Journey Toward Quantum-Resistant Algorithms: NIST’s Initiative

In 2015, NIST embarked on a mission to develop quantum-resistant algorithms, anticipating the future capabilities of quantum computers.

- Advertisement - SIEM as a Service

After evaluating 82 algorithms from 25 countries, NIST identified the top candidates with the help of global cryptographers.

These algorithms were refined into finalists and alternatives, leading to draft standards released in 2023.

The finalized standards are ready for implementation, and cybersecurity experts are encouraged to promptly integrate them into their systems. Encryption protects electronic secrets, from personal emails to national security data.

Current encryption relies on complex mathematical problems that conventional computers find difficult to solve.

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

However, a powerful quantum computer could potentially crack these codes quickly. The new algorithms standardized by NIST are designed to resist both conventional and quantum attacks, ensuring robust security for the future.

The Importance of Immediate Implementation

NIST mathematician Dustin Moody, who leads the post-quantum cryptography (PQC) standardization project, emphasized the importance of immediate implementation.

“These finalized standards include instructions for incorporating them into products and encryption systems,” Moody stated.

“We encourage system administrators to start integrating them into their systems immediately because full integration will take time.” The new standards are essential tools for general encryption and digital signature protection.

While NIST continues to evaluate additional sets of algorithms for potential backup standards, the current three are considered the primary defense against future quantum threats.

NIST’s efforts do not stop with the finalization of these three algorithms. The agency also evaluates two other algorithms that could serve as future backups.

One set focuses on general encryption using different mathematical problems, with selections expected by 2024.

The second set includes algorithms for digital signatures, with further evaluations underway. Moody reassured that while additional standards are being developed, the current three algorithms are sufficient for most applications.

“There is no need to wait for future standards,” he said. “Go ahead and start using these three. We need to be prepared in case of an attack that defeats the algorithms in these three standards, and we will continue working on backup plans to keep our data safe.”

As quantum computing technology advances, NIST remains at the forefront of ensuring digital security keeps pace, providing the necessary tools to protect sensitive information in a post-quantum world.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Acces

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

I-O DATA Routers Command Injection Vulnerabilities Actively Exploited in Attacks

I-O DATA DEVICE, INC. has announced that several critical vulnerabilities in their UD-LT1 and...

ChatGPT Next Web Vulnerability Let Attackers Exploit Endpoint to Perform SSRF

Researchers released a detailed report on a significant security vulnerability named CVE-2023-49785, affecting the...

Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification

A critical vulnerability has been identified in the bootloader of Cisco NX-OS Software, potentially...

Deloitte UK Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data

Brain Cipher has claimed to have breached Deloitte UK and exfiltrated over 1 terabyte...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

I-O DATA Routers Command Injection Vulnerabilities Actively Exploited in Attacks

I-O DATA DEVICE, INC. has announced that several critical vulnerabilities in their UD-LT1 and...

ChatGPT Next Web Vulnerability Let Attackers Exploit Endpoint to Perform SSRF

Researchers released a detailed report on a significant security vulnerability named CVE-2023-49785, affecting the...

Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification

A critical vulnerability has been identified in the bootloader of Cisco NX-OS Software, potentially...