(GCN.com) The National Institute of Standards and Technology’s National Cybersecurity Center of Excellence has released the final version of a white paper, “Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms.”
Since 2016, NIST has been working with researchers to develop cryptographic algorithms that will be strong enough to resist the privacy and security threats quantum computers will pose. While those new algorithms will likely be ready before quantum computers are widely used, the transition from today’s standards to the new post-quantum public-key standards “is likely to be more problematic than the introduction of new classical cryptographic algorithms,” the paper states. “In the absence of significant implementation planning, it may be decades before the community replaces most of the vulnerable public-key systems currently in use.”
One problem is that existing encryption standards can’t simply be replaced with quantum-resistant ones. Some quantum-resistant candidate algorithms involve extremely large signature sizes, require excessive processing and use very large public or private keys that would make the solution difficult to implement widely.
Consequently, detailed migration roadmaps and playbooks must be developed to help organizations first discover where and how public-key cryptography is currently being used and then determine where migration to post-quantum cryptography will be required. In some cases, migration from classical to post-quantum encryption may involve temporarily depending on hybrid algorithms.
“We need to determine where, why, and with what priority vulnerable public-key algorithms will need to be replaced, and we need to understand the constraints that apply to specific use cases,” NIST states. “These initial steps in developing and implementing algorithm migration playbooks can and should begin immediately.”