The state of the post-quantum Internet
The National Institute of Standards and Technology (NIST) is currently working on developing post-quantum cryptographic standards to protect against quantum computing threats. Post-quantum cryptography refers to cryptographic algorithms that are thought to be secure against both classical and quantum computers. NIST has been running a public competition since 2016, with the aim of selecting one or more new public-key cryptographic algorithms for standardization in the post-quantum era. In December 2022, NIST announced its first set of draft standards for post-quantum cryptography: key establishment and digital signatures. The selected algorithms are Kyber (for key establishment) and Dilithium, Falcon, and SPHINCS+ (for digital signatures). Key establishment is the process by which two parties agree on a shared secret over an insecure channel. Digital signatures provide message integrity and non-repudiation of origin. NIST's draft standards for post-quantum cryptography are significant because they represent the first concrete steps towards securing our digital infrastructure against quantum computing threats. However, it is important to note that these algorithms are not yet ready for widespread deployment. NIST plans to continue its public competition and expects to announce additional post-quantum cryptographic standards in the coming years. In summary, NIST's draft standards for post-quantum cryptography represent a major milestone in the ongoing effort to secure our digital infrastructure against quantum computing threats. While these algorithms are not yet ready for widespread deployment, they provide valuable insights into the types of cryptographic techniques that may be needed in the post-quantum era.
Company
Cloudflare
Date published
March 5, 2024
Author(s)
Bas Westerbaan
Word count
9168
Language
English
Hacker News points
4