Post-quantum cryptography algorithms named

By

NIST readies future standard.

America’s National Institute of Standards and Technology has named the first four encryption algorithms it believes will survive the advent of quantum computing.

Post-quantum cryptography algorithms named

At some point, quantum computers are expected to pose a threat to current encryption, because some quantum algorithms (Shor’s algorithm, for example) can factor large prime numbers quickly.

That led NIST to launch a search for algorithms that are resistant to quantum factorisation in 2016, with a view to including them in its eventual post-quantum cryptography standardisation project.

The algorithms that will make it into the standard so far are named CRYSTALS-Kyber,  CRYSTALS-Dilithium, FALCON and SPHINCS+.

NIST says the four algorithms “rely on math problems that both conventional and quantum computers should have difficulty solving”.

It describes CRYSTALS-Kyber as a “general encryption” scheme suitable for information passing over the Internet.

The other three are for digital signature applications: CRYSTALS-Dilithium is nominated as the primary algorithm, FALCON is more lightweight, and while larger and slower, SPHINCS+ takes a different mathematical approach to the other two.

All of the algorithms are available for download.

NIST has another four algorithms under consolidation, for announcement at a future date.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Eagers Automotive finds unauthorised access to parts of IT systems

Eagers Automotive finds unauthorised access to parts of IT systems

Hackers hit Victoria's court recording database

Hackers hit Victoria's court recording database

St Vincent's Health Australia warns cyber attack forensics could "take some time"

St Vincent's Health Australia warns cyber attack forensics could "take some time"

Yakult Australia confirms cyber incident

Yakult Australia confirms cyber incident

Log In

  |  Forgot your password?