In a landmark announcement, the National Institute of Standards and Technology (NIST) has introduced the first set of algorithms designed to defend systems and networks from quantum computer attacks. Quantum computers can process far more information than traditional computers, posing a significant threat to existing security measures. This announcement follows an eight-year project where NIST evaluated algorithms from around the world to find the best defenses against these powerful machines.
NIST's Quantum Security Algorithms Aim to Stay Ahead of Quantum Threats
The world's internet traffic, financial systems, and communications infrastructure rely on algorithms to protect sensitive information. Current algorithms are built to withstand attacks from conventional computers, which can't handle the advanced computational power of quantum systems. Quantum computing could potentially bypass these defenses using algorithms like Grover's and Shor's.
To counter these threats, NIST has introduced three new algorithms designed to secure data from quantum computing threats. These are available for immediate use and are detailed on NIST's website, including software code and implementation instructions.
The new algorithms are based on CRYSTALS-Kyber, CRYSTALS-Dilithium, and Sphincs+ standards. CRYSTALS-Kyber focuses on general encryption, providing protection for information on networks. CRYSTALS-Dilithium and Sphincs+ are aimed at digital signatures, ensuring the authenticity of documents and data. CRYSTALS-Dilithium serves as the primary defense, while Sphincs+ is a backup.
NIST is also working on additional backup standards, with plans to release two more general encryption algorithms and 15 digital signature algorithms in the near future. These will serve as contingencies if the current standards need reinforcement.