Post-quantum cryptography algorithms named

By

NIST readies future standard.

America’s National Institute of Standards and Technology has named the first four encryption algorithms it believes will survive the advent of quantum computing.

Post-quantum cryptography algorithms named

At some point, quantum computers are expected to pose a threat to current encryption, because some quantum algorithms (Shor’s algorithm, for example) can factor large prime numbers quickly.

That led NIST to launch a search for algorithms that are resistant to quantum factorisation in 2016, with a view to including them in its eventual post-quantum cryptography standardisation project.

The algorithms that will make it into the standard so far are named CRYSTALS-Kyber,  CRYSTALS-Dilithium, FALCON and SPHINCS+.

NIST says the four algorithms “rely on math problems that both conventional and quantum computers should have difficulty solving”.

It describes CRYSTALS-Kyber as a “general encryption” scheme suitable for information passing over the Internet.

The other three are for digital signature applications: CRYSTALS-Dilithium is nominated as the primary algorithm, FALCON is more lightweight, and while larger and slower, SPHINCS+ takes a different mathematical approach to the other two.

All of the algorithms are available for download.

NIST has another four algorithms under consolidation, for announcement at a future date.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

"Widespread data theft" hits Salesforce customers via third party

"Widespread data theft" hits Salesforce customers via third party

Home Affairs adds SecOps to new cyber risk overhaul

Home Affairs adds SecOps to new cyber risk overhaul

Exetel fined $694k over system 'vulnerability' for mobile number porting

Exetel fined $694k over system 'vulnerability' for mobile number porting

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Log In

  |  Forgot your password?