SlideShare a Scribd company logo
2
Most read
7
Most read
10
Most read
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www. nstitute.org
uscsi
POST-QUANTUM
CRYPTOGRAPHY
KNOWING THE UNKNOWN CYBER WORLD
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org
institute
The Post-Quantum
transition is an imminent
challenge that the global IT
industry must be prepared
to confront
-Douglas Stebila
Associate Professor, Cryptography
@University of Waterloo, Ontario, Canada
Quantum computers, Sycamore, are so powerful that
they can perform calculations in a few hundred
seconds; that a traditional supercomputer would take
10,000 years to do (Google Research).
Demonstrating such exemplary potential is not a
matter of sheer luck. It goes to the decades of smart
AI evolution that have triggered such a great expanse
of technology around the world.
THE IS
POST-QUANTUM RAGE ON!
Are you all in yet?
“
”
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved.
Understanding the Quantum ecosystem is a must as you plan to tread forward with greater in
AI
cybersecurity frameworks. Looking deep into the way these genius quantum computing machines and
cryptographic techniques work is a work of art and indeed requires every ounce of curiosity and
integrity to master these nuances for a thriving cybersecurity career.
www.uscs .org
institute
TRADITIONAL VS QUANTUM COMPUTING
1
0
0
1
0
1
1
0
Calculates with qubits, which
can represent 0 and 1 at the
same time
Calculates with transistors,
which can represent either
0 or 1
Power increases
exponentially in proportion
to the number of qubits
Power increases in a 1:1
relationship with the
number of transistors
Quantum computers have
high error rates and need to
be kept ultracold
Classical computers have
low error rates and can
operate at room temp
Well suited for tasks like
optimization problems,
data analysis, and
simulations
Most everyday processing
is best handled by classical
computers
QUANTUM COMPUTING CLASSICAL COMPUTING
vs
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org
institute
HOW POWERFUL IS THE QUANTUM COMPUTING MECHANISM?
Quantum computers hold the hope of the future computing generations.
Quantum computers can "skip over" the linear journey through every pathway
by using quantum mechanics to simultaneously consider all possible outcomes.
Quantum computing works with probabilities rather than binaries. This form of
computing allows for solutions to problems that are too large or too complex to
solve in any reasonable time by a classical computer. Where a classical computer
can sort through and catalog large amounts of data, it cannot predict behavior
within that data.
POPULAR USE CASES OF QUANTUM COMPUTING
UNDERSTANDING QUANTUM THREATS
These are the risks that could render ineffective encryption tools used to protect data,
cybersecurity
transactions, and beyond. Quantum computers are efficiently equipped to break encryption methods
at an alarming speed, making them a threat to data security.
Artificial Intelligence and Machine Learning
Grid Optimization
Cryptography and Data Security
Drug Discovery and Development
Material Science and Design
Protein Folding
Disease Risk Predictions
Quantum Chemistry
Financial Modeling and Portfolio Optimization
Traffic Optimization and Smart Cities
Weather Forecasting and Climate Modeling
Design Optimization
Quantum in Space
Supply Chain and Inventory Optimization
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org
institute
HOW DOES QUANTUM THREATEN CRYPTOGRAPHY?
Quantum computing, possessing unparalleled computational power, poses a significant risk to the
cryptographic protocols safeguarding our digital realm. Current cybersecurity cornerstones, such as RSA
and ECC algorithms, are vulnerable to quantum advancements. These risks are rapidly shifting from
theoretical to tangible due to swift progress in quantum computing. Addressing these threats demands
multifaceted efforts: developing new designs and implementing novel algorithms and protocols. This
process necessitates specialized skills, substantial time, and resources. With the urgency of these
developments, it is imperative to act promptly, recognizing the extensive work that lies ahead. Looking at
the grave urgency, it is imperative to reflect upon these questions before you pivot and try to mitigate
Quantum threats.
This leads you to understand that the entire gamut of quantum resistance is crucial to quantum security
resistance. It involves developing secure algorithms and protocols that can withstand attacks using
quantum, classical computers, and a combination of both. Quantum-resistant technologies are key to
safeguarding IoT devices and ecosystems, ensuring data safety, and protecting digital assets against
these emerging threats.
QUANTUM
CRYPTOGRAPHY
PRE-QUANTUM
CRYPTOGRAPHY
A type of cryptography
that uses algorithms
to convert
human- readable
data into
secret code
AKA Quantum
Encryption; refers to
various cybersecurity
methods for
encrypting and
transmitting secure
data based on the
naturally occurring
and immutable laws of
quantum mechanics.
POST-QUANTUM
CRYPTOGRAPHY
A field of cryptography
that aims to develop
algorithms that are
resistant to attacks
from quantum
computers.
Navigating the quantum shift
States' Regulations?
Physical/Logical Attacks?
Cryptanalysis?
Error Computations?
Number of Qubits?
Algorithms/ Protocols? Assets Type/Life Duration?
Cost/Time to Migrate?
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org
institute
POST-QUANTUM CRYPTOGRAPHY- TYPES
POST-QUANTUM
CRYPTOGRAPHY
(PQC)
CODE-BASED
Uses error-based code for encryption.
HASH-BASED
Among the most secure PQC methods but the
slowest as well; that scrambles variable length
data as fixed-length values.
MULTIVARIATE POLYNOMIAL
Quickest method with least security offered.
LATTICE-BASED
One of the most secure PQC encryption methods that uses
lattice-related mathematical issues.
POST-QUANTUM CRYPTOGRAPHY ALGORITHMS
These are powerful cryptographic algorithms that are designed to be secure against quantum
computers. The best mitigation against the threat of quantum computers to traditional public key
cryptography (PKC) is post-quantum computing (PQC). Also popularly known as 'Quantum Safe
cryptography' or 'Quantum-resistant cryptography'; PQC algorithms will replace the vulnerable PKC
algorithms used today for both key establishment and digital signatures.
The security of PQC algorithms is based on mathematical problems that are believed to be intractable for
both classical and quantum computers. These algorithms will not necessarily be drop-in replacements for
the current PKC algorithms in protocols or systems, so system owners should begin planning for the
migration to PQC.
f(x)
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved.
Some of the popular PQC algorithms are:
www.uscs .org
institute
Lattice-based Cryptography
NTRU: Based on the problem of finding a short vector in a special type of
lattice called Cyclotomic lattice
LWE (Learning with Errors): Involves distinguishing between random
linear equations and the ones with noise
Ring-LWE: A variant of LWE, operating over polynomial rings for efficient
implementation of lattice-based cryptography
Code-based Cryptography
McEliece: Based on the problem of decoding a random linear code
Goppa: A type of code-based cryptography; that uses Goppa codes
Hash-based Cryptography
XMSS: Based on the Merkle Tree Data structure; used for digital signatures
SPHINCS: Family of hash-based signature algorithms best for security and
performance trade-offs
Multi-variate Cryptography
Matsumoto-Imai: Based on quadratic equation problem-solving
methods, it resolves public-key encryptions
UOV (Unbalanced Oil and Vinegar): Used for public-key encryption and
digital signatures
Super-singular Isogeny Cryptography
SIDH: Perfect for key exchange and digital signatures
f(x)
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org
institute
Wonder what makes Gartner say
Quantum Computing will render
traditional Cryptography
UNSAFE by 2029
WHY POST-QUANTUM CRYPTOGRAPHY TRANSITION
AN URGENT PRIORITY?
Quantum Cryptography Timeline; as explained by Gartner; stresses the urgent need to switch to the
next generation of data protection with post-quantum cryptography in the spotlight. Asymmetric
encryption is in almost all software, billions of devices worldwide, and most of the communications over
the internet. Yet by 2029, advances in quantum computing will make asymmetric cryptography unsafe
and by 2034 fully breakable. "Harvest-now, decrypt-later" attacks may already exist. To resist attacks
from both classical and quantum computers, organizations must transition to post-quantum
cryptography.
Source: Gartner
“
”
2022 2023 2024 2025 2026 2027 2028 2029 2030
Current
Build cryptographic
metadata database
Build crypto policies
for next phase
Lifeboat exercise for
data (L/M/S term use)
Plan transition phase
plan
Start crypto-agile dev
strategy (e.g., CCOE)
Transition
Implement transition
plan
Purge useless/expired
data with weak crypto
Implement transitional
crypto policies
Implement crypto-
agile application
development & move
to production
Ongoing
End of life nonagile
applications
Enforce strong crypto
polices for data
Vet and test new PQ
crypto policies
algorithms
Full transition to
CCOE
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org
institute
CHALLENGES IN POST-QUANTUM CRYPTOGRAPHY ADOPTION
However, the road ahead is quite challenging. While; many organizations have not yet planned or
budgeted for this shift. Many governments are already issuing mandates and legal frameworks for
organizations to put in place a post-quantum cryptography strategy. you need to address the following
listed hurdles that may retard your growth with time.
Difficulty Finding Replacements:
No drop-in alternatives exist for current cryptographic
algorithms. This creates the need for discovery, categorization,
and reimplementation
Diverse Performance Requisites:
New algorithms have different performance characteristics than
asymmetric ones. Key and ciphertext sizes are larger, for example,
and encryption and decryption times are longer. This may impact
performance and require restating or rewriting of current
applications.
Organizational Incompetence:
Few organizations know how their cryptography works, where
keys and algorithms are used, or how secrets are stored and
managed.
Vendors Lack Preparedness:
Do not assume that your vendors are equipped to handle post-
quantum cryptography. Most are unprepared to upgrade and
may not recognize that they need to unless you push them.
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org
institute
WAY TO QUANTUM RESISTANCE IMPLEMENTATION PLAN
MIGRATION TO QUANTUM-RESISTANT CRYPTOGRAPHY
Assess and prioritize
Evaluate current
cryptographic systems
Identify critical data and
infrastructure
Prioritize high-risk
components for migration
Create a migration
strategy
Develop a detailed plan with
timelines
Allocate necessary resources
Employ phased approach
for implementation
Research and choose
appropriate algorithms
Investigate quantum-resistant
algorithms
Select algorithms endorsed by
reputable organizations like NIST
Test and validate
Conduct exhaustive testing
Evaluate efficacy, efficiency.
and compatibility
Identify and address any
limitations or weaknesses
Continuously monitor
developments
Stay updated on quantum
computing advancements
Select algorithms endorsed by
reputable organizations like NIST
Modify cryptographic
systems accordingly
Adapt to evolving
technologies and threats
1
2 3
4
5
Digging deep into the Post-Quantum Cryptography holds immense stature in
maintaining data confidentiality and information security. Generating and deciphering
codes that permit access to the data solely by approved entities. Fast-forwarding to the
present day, there have been considerable advancements in computing technology, and
quantum computers are anticipated to become a reality within the next ten years. Aim at
nailing the top cybersecurity certification programs that can ramp up your credibility as
a cybersecurity specialist. The world awaits you to reveal the futuristic cybersecurity
trends as a seasoned cybersec player worldwide!
®
© Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved.
ENROLL IN
CERTIFICATION
NOW
The United States Cybersecurity Institute
®
(USCSI )is a world-renowned cybersecurity
certification body offering the best-in-the-world
certifications for students and professionals
around the globe across industries. Whether a
beginner looking to step on cybersecurity career
path or a seasoned expert, it validates their
cybersecurity expertise to ace this domain.

More Related Content

PDF
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
PDF
Exploring Quantum Cryptography: Next-Generation Security Protocols
PPTX
McClansy Security Corporation
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
PDF
QUANTUM COMPUTING AND THE IMPLICATIONS ON ONLINE SECURITY
PDF
Quantum Computing and the Implications on Online Security
PDF
Report.pdf
PPTX
Quantum Safety in Certified Cryptographic Modules
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: Next-Generation Security Protocols
McClansy Security Corporation
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
QUANTUM COMPUTING AND THE IMPLICATIONS ON ONLINE SECURITY
Quantum Computing and the Implications on Online Security
Report.pdf
Quantum Safety in Certified Cryptographic Modules

Similar to Post-Quantum Cryptography - Knowing the Unknown Cyber World | USCSI® (20)

PPTX
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
PDF
What is Quantum Cryptography and Know How Does QKD Work
DOCX
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
PDF
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
PPTX
Post Quantum Encryption Presentation by srm.pptx
PDF
Crypto Quantum Leap.pdf
PPTX
Prepare For Post-Quantum Cryptography
PDF
Domen Zavrl - The Quantum Future of Cryptography
PDF
The Quantum Leap in Crypto_ Navigating the Future of Blockchain and Quantum C...
PDF
CryptoQuantumLeap.pdf
PDF
Quantum computing and its Impact to ICT industry
PDF
Cryptography And Embedded Systems Used
PDF
Three Party Authenticated Key Distribution using Quantum Cryptography
PPTX
Quantum computing
PPTX
Artificial Intelligence and Quantum Cryptography
PDF
Quantum Hardware Hacking
PPTX
The convergence of IoT and Quantum Computing
PPTX
secure communication using quantum cryptography[1].pptx
PDF
Sp_Tropos_v1.pdf
PPTX
Artificial Intelligence and Quantum Cryptography
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
What is Quantum Cryptography and Know How Does QKD Work
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
Post Quantum Encryption Presentation by srm.pptx
Crypto Quantum Leap.pdf
Prepare For Post-Quantum Cryptography
Domen Zavrl - The Quantum Future of Cryptography
The Quantum Leap in Crypto_ Navigating the Future of Blockchain and Quantum C...
CryptoQuantumLeap.pdf
Quantum computing and its Impact to ICT industry
Cryptography And Embedded Systems Used
Three Party Authenticated Key Distribution using Quantum Cryptography
Quantum computing
Artificial Intelligence and Quantum Cryptography
Quantum Hardware Hacking
The convergence of IoT and Quantum Computing
secure communication using quantum cryptography[1].pptx
Sp_Tropos_v1.pdf
Artificial Intelligence and Quantum Cryptography
Ad

More from United States Cybersecurity Institute (USCSI®) (20)

PDF
What is Data Detection and Response (DDR): Working, Benefits, and Importance
PDF
An Elaborate Take on ChatGPT Security Risks for 2025 | USCSI®
PDF
Cyberattack on DeepSeek Exposes Vulnerability in AI models | USCSI®
PDF
Is Agentic AI a Threat to Cybersecurity of Business Enterprises? | USCSI®
PDF
Information Security - Goals, Challenges, and Best Practices Discussed | USCSI®
PDF
How does Identity and Access Management (IAM) Enhance an Organization’s Secur...
PDF
Top 12 Kali Linux Tools for Ethical Hackers | USCSI®
PDF
Email Security: Protecting Your Business from Cyber Threats | Infographic | U...
PDF
Spoofing Attack - Meaning, Working & Prevention Plan Explained | USCSI®
PDF
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
PDF
Hashing in Cybersecurity - Can AI Alter the Future of Encryption? | USCSI®
PDF
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
PDF
Deepfake it until you make it: An Overview | USCSI®
PDF
How to Secure Your Network with Kerberos Authentication | USCSI®
PDF
Understanding Cybersecurity Transformation and Its Importance for Businesses ...
PDF
Importance of Data Encryptions for Organizations | USCSI®
PDF
How is AI Transforming the Cybersecurity Landscape? | USCSI®
PDF
Cyberbullying: Types and Impact on Social Life | USCSI®
PDF
Understanding Vulnerability Management | USCSI®
PDF
How to Secure Your Network with Kerberos Authentication | USCSI®
What is Data Detection and Response (DDR): Working, Benefits, and Importance
An Elaborate Take on ChatGPT Security Risks for 2025 | USCSI®
Cyberattack on DeepSeek Exposes Vulnerability in AI models | USCSI®
Is Agentic AI a Threat to Cybersecurity of Business Enterprises? | USCSI®
Information Security - Goals, Challenges, and Best Practices Discussed | USCSI®
How does Identity and Access Management (IAM) Enhance an Organization’s Secur...
Top 12 Kali Linux Tools for Ethical Hackers | USCSI®
Email Security: Protecting Your Business from Cyber Threats | Infographic | U...
Spoofing Attack - Meaning, Working & Prevention Plan Explained | USCSI®
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
Hashing in Cybersecurity - Can AI Alter the Future of Encryption? | USCSI®
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
Deepfake it until you make it: An Overview | USCSI®
How to Secure Your Network with Kerberos Authentication | USCSI®
Understanding Cybersecurity Transformation and Its Importance for Businesses ...
Importance of Data Encryptions for Organizations | USCSI®
How is AI Transforming the Cybersecurity Landscape? | USCSI®
Cyberbullying: Types and Impact on Social Life | USCSI®
Understanding Vulnerability Management | USCSI®
How to Secure Your Network with Kerberos Authentication | USCSI®
Ad

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation_ Review paper, used for researhc scholars
The Rise and Fall of 3GPP – Time for a Sabbatical?

Post-Quantum Cryptography - Knowing the Unknown Cyber World | USCSI®

  • 1. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www. nstitute.org uscsi POST-QUANTUM CRYPTOGRAPHY KNOWING THE UNKNOWN CYBER WORLD
  • 2. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org institute The Post-Quantum transition is an imminent challenge that the global IT industry must be prepared to confront -Douglas Stebila Associate Professor, Cryptography @University of Waterloo, Ontario, Canada Quantum computers, Sycamore, are so powerful that they can perform calculations in a few hundred seconds; that a traditional supercomputer would take 10,000 years to do (Google Research). Demonstrating such exemplary potential is not a matter of sheer luck. It goes to the decades of smart AI evolution that have triggered such a great expanse of technology around the world. THE IS POST-QUANTUM RAGE ON! Are you all in yet? “ ”
  • 3. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. Understanding the Quantum ecosystem is a must as you plan to tread forward with greater in AI cybersecurity frameworks. Looking deep into the way these genius quantum computing machines and cryptographic techniques work is a work of art and indeed requires every ounce of curiosity and integrity to master these nuances for a thriving cybersecurity career. www.uscs .org institute TRADITIONAL VS QUANTUM COMPUTING 1 0 0 1 0 1 1 0 Calculates with qubits, which can represent 0 and 1 at the same time Calculates with transistors, which can represent either 0 or 1 Power increases exponentially in proportion to the number of qubits Power increases in a 1:1 relationship with the number of transistors Quantum computers have high error rates and need to be kept ultracold Classical computers have low error rates and can operate at room temp Well suited for tasks like optimization problems, data analysis, and simulations Most everyday processing is best handled by classical computers QUANTUM COMPUTING CLASSICAL COMPUTING vs
  • 4. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org institute HOW POWERFUL IS THE QUANTUM COMPUTING MECHANISM? Quantum computers hold the hope of the future computing generations. Quantum computers can "skip over" the linear journey through every pathway by using quantum mechanics to simultaneously consider all possible outcomes. Quantum computing works with probabilities rather than binaries. This form of computing allows for solutions to problems that are too large or too complex to solve in any reasonable time by a classical computer. Where a classical computer can sort through and catalog large amounts of data, it cannot predict behavior within that data. POPULAR USE CASES OF QUANTUM COMPUTING UNDERSTANDING QUANTUM THREATS These are the risks that could render ineffective encryption tools used to protect data, cybersecurity transactions, and beyond. Quantum computers are efficiently equipped to break encryption methods at an alarming speed, making them a threat to data security. Artificial Intelligence and Machine Learning Grid Optimization Cryptography and Data Security Drug Discovery and Development Material Science and Design Protein Folding Disease Risk Predictions Quantum Chemistry Financial Modeling and Portfolio Optimization Traffic Optimization and Smart Cities Weather Forecasting and Climate Modeling Design Optimization Quantum in Space Supply Chain and Inventory Optimization
  • 5. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org institute HOW DOES QUANTUM THREATEN CRYPTOGRAPHY? Quantum computing, possessing unparalleled computational power, poses a significant risk to the cryptographic protocols safeguarding our digital realm. Current cybersecurity cornerstones, such as RSA and ECC algorithms, are vulnerable to quantum advancements. These risks are rapidly shifting from theoretical to tangible due to swift progress in quantum computing. Addressing these threats demands multifaceted efforts: developing new designs and implementing novel algorithms and protocols. This process necessitates specialized skills, substantial time, and resources. With the urgency of these developments, it is imperative to act promptly, recognizing the extensive work that lies ahead. Looking at the grave urgency, it is imperative to reflect upon these questions before you pivot and try to mitigate Quantum threats. This leads you to understand that the entire gamut of quantum resistance is crucial to quantum security resistance. It involves developing secure algorithms and protocols that can withstand attacks using quantum, classical computers, and a combination of both. Quantum-resistant technologies are key to safeguarding IoT devices and ecosystems, ensuring data safety, and protecting digital assets against these emerging threats. QUANTUM CRYPTOGRAPHY PRE-QUANTUM CRYPTOGRAPHY A type of cryptography that uses algorithms to convert human- readable data into secret code AKA Quantum Encryption; refers to various cybersecurity methods for encrypting and transmitting secure data based on the naturally occurring and immutable laws of quantum mechanics. POST-QUANTUM CRYPTOGRAPHY A field of cryptography that aims to develop algorithms that are resistant to attacks from quantum computers. Navigating the quantum shift States' Regulations? Physical/Logical Attacks? Cryptanalysis? Error Computations? Number of Qubits? Algorithms/ Protocols? Assets Type/Life Duration? Cost/Time to Migrate?
  • 6. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org institute POST-QUANTUM CRYPTOGRAPHY- TYPES POST-QUANTUM CRYPTOGRAPHY (PQC) CODE-BASED Uses error-based code for encryption. HASH-BASED Among the most secure PQC methods but the slowest as well; that scrambles variable length data as fixed-length values. MULTIVARIATE POLYNOMIAL Quickest method with least security offered. LATTICE-BASED One of the most secure PQC encryption methods that uses lattice-related mathematical issues. POST-QUANTUM CRYPTOGRAPHY ALGORITHMS These are powerful cryptographic algorithms that are designed to be secure against quantum computers. The best mitigation against the threat of quantum computers to traditional public key cryptography (PKC) is post-quantum computing (PQC). Also popularly known as 'Quantum Safe cryptography' or 'Quantum-resistant cryptography'; PQC algorithms will replace the vulnerable PKC algorithms used today for both key establishment and digital signatures. The security of PQC algorithms is based on mathematical problems that are believed to be intractable for both classical and quantum computers. These algorithms will not necessarily be drop-in replacements for the current PKC algorithms in protocols or systems, so system owners should begin planning for the migration to PQC. f(x)
  • 7. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. Some of the popular PQC algorithms are: www.uscs .org institute Lattice-based Cryptography NTRU: Based on the problem of finding a short vector in a special type of lattice called Cyclotomic lattice LWE (Learning with Errors): Involves distinguishing between random linear equations and the ones with noise Ring-LWE: A variant of LWE, operating over polynomial rings for efficient implementation of lattice-based cryptography Code-based Cryptography McEliece: Based on the problem of decoding a random linear code Goppa: A type of code-based cryptography; that uses Goppa codes Hash-based Cryptography XMSS: Based on the Merkle Tree Data structure; used for digital signatures SPHINCS: Family of hash-based signature algorithms best for security and performance trade-offs Multi-variate Cryptography Matsumoto-Imai: Based on quadratic equation problem-solving methods, it resolves public-key encryptions UOV (Unbalanced Oil and Vinegar): Used for public-key encryption and digital signatures Super-singular Isogeny Cryptography SIDH: Perfect for key exchange and digital signatures f(x)
  • 8. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org institute Wonder what makes Gartner say Quantum Computing will render traditional Cryptography UNSAFE by 2029 WHY POST-QUANTUM CRYPTOGRAPHY TRANSITION AN URGENT PRIORITY? Quantum Cryptography Timeline; as explained by Gartner; stresses the urgent need to switch to the next generation of data protection with post-quantum cryptography in the spotlight. Asymmetric encryption is in almost all software, billions of devices worldwide, and most of the communications over the internet. Yet by 2029, advances in quantum computing will make asymmetric cryptography unsafe and by 2034 fully breakable. "Harvest-now, decrypt-later" attacks may already exist. To resist attacks from both classical and quantum computers, organizations must transition to post-quantum cryptography. Source: Gartner “ ” 2022 2023 2024 2025 2026 2027 2028 2029 2030 Current Build cryptographic metadata database Build crypto policies for next phase Lifeboat exercise for data (L/M/S term use) Plan transition phase plan Start crypto-agile dev strategy (e.g., CCOE) Transition Implement transition plan Purge useless/expired data with weak crypto Implement transitional crypto policies Implement crypto- agile application development & move to production Ongoing End of life nonagile applications Enforce strong crypto polices for data Vet and test new PQ crypto policies algorithms Full transition to CCOE
  • 9. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org institute CHALLENGES IN POST-QUANTUM CRYPTOGRAPHY ADOPTION However, the road ahead is quite challenging. While; many organizations have not yet planned or budgeted for this shift. Many governments are already issuing mandates and legal frameworks for organizations to put in place a post-quantum cryptography strategy. you need to address the following listed hurdles that may retard your growth with time. Difficulty Finding Replacements: No drop-in alternatives exist for current cryptographic algorithms. This creates the need for discovery, categorization, and reimplementation Diverse Performance Requisites: New algorithms have different performance characteristics than asymmetric ones. Key and ciphertext sizes are larger, for example, and encryption and decryption times are longer. This may impact performance and require restating or rewriting of current applications. Organizational Incompetence: Few organizations know how their cryptography works, where keys and algorithms are used, or how secrets are stored and managed. Vendors Lack Preparedness: Do not assume that your vendors are equipped to handle post- quantum cryptography. Most are unprepared to upgrade and may not recognize that they need to unless you push them.
  • 10. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. www.uscs .org institute WAY TO QUANTUM RESISTANCE IMPLEMENTATION PLAN MIGRATION TO QUANTUM-RESISTANT CRYPTOGRAPHY Assess and prioritize Evaluate current cryptographic systems Identify critical data and infrastructure Prioritize high-risk components for migration Create a migration strategy Develop a detailed plan with timelines Allocate necessary resources Employ phased approach for implementation Research and choose appropriate algorithms Investigate quantum-resistant algorithms Select algorithms endorsed by reputable organizations like NIST Test and validate Conduct exhaustive testing Evaluate efficacy, efficiency. and compatibility Identify and address any limitations or weaknesses Continuously monitor developments Stay updated on quantum computing advancements Select algorithms endorsed by reputable organizations like NIST Modify cryptographic systems accordingly Adapt to evolving technologies and threats 1 2 3 4 5 Digging deep into the Post-Quantum Cryptography holds immense stature in maintaining data confidentiality and information security. Generating and deciphering codes that permit access to the data solely by approved entities. Fast-forwarding to the present day, there have been considerable advancements in computing technology, and quantum computers are anticipated to become a reality within the next ten years. Aim at nailing the top cybersecurity certification programs that can ramp up your credibility as a cybersecurity specialist. The world awaits you to reveal the futuristic cybersecurity trends as a seasoned cybersec player worldwide!
  • 11. ® © Copyright 2024. United States Cybersecurity Institute (USCSI ). All Rights Reserved. ENROLL IN CERTIFICATION NOW The United States Cybersecurity Institute ® (USCSI )is a world-renowned cybersecurity certification body offering the best-in-the-world certifications for students and professionals around the globe across industries. Whether a beginner looking to step on cybersecurity career path or a seasoned expert, it validates their cybersecurity expertise to ace this domain.