You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Investigate a backward compatible migration to post-quantum hashing and encryption using noble libraries https://github.com/paulmillr/noble-post-quantum
'backward compatible' really just means ensuring that no existing encrypted content is unable to be decrypted by hard-cutting over to the new encryption/decryption schemes so move to supporting multiple encryption/decryption and hashing methods.
“Any digital system that uses existing public standards for public‑key cryptography, or
that is planning to transition to such cryptography, could be vulnerable to an attack by a
Cryptographically Relevant Quantum Computer (CRQC). To mitigate this risk, the United
States must prioritize the timely and equitable transition of cryptographic systems to
quantum-resistant cryptography, with the goal of mitigating as much of the quantum
risk as is feasible by 2035.”
The text was updated successfully, but these errors were encountered:
Investigate a backward compatible migration to post-quantum hashing and encryption using noble libraries https://github.com/paulmillr/noble-post-quantum
'backward compatible' really just means ensuring that no existing encrypted content is unable to be decrypted by hard-cutting over to the new encryption/decryption schemes so move to supporting multiple encryption/decryption and hashing methods.
https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf
National Security Memorandum 10 (NSM-10) establishes the year 2035 as the primary target
for completing the migration to PQC across Federal systems [NSM10]:
The text was updated successfully, but these errors were encountered: