Preparing for Post-Quantum Cryptography

Scientists generally agree that “quantum computers will be able to break widely used public-key cryptographic schemes when they come into being,” says the European Union Agency for Cybersecurity (ENISA). 

The transition to “quantum-resistant cryptographic algorithms is expected to take years due to the complex processes and financial costs,” ENISA notes. However, governments and organizations need to anticipate the rise of quantum capabilities and prepare for resulting changes.

A new report from ENISA “answers the difficult questions raised by post-quantum cryptography in order to make sure we will avoid jeopardising today's public key cryptosystems, e-commerce, digital signatures, electronic identities, etc.” 

It also offers technical recommendations, such as:

  • Developing guidelines for major use cases to assess trade-offs 
  • The use of hybrid systems, where post-quantum cryptography is layered on top of pre-quantum cryptography.

Learn more at ENISA.

Ready to find a job? Check out the latest job listings at Open Source JobHub.

Comments