Post-Quantum Cryptographic Algorithms

Cryptographic technologies are used throughout government and industry to authenticate the source and protect the confidentiality and integrity of information that we communicate and store. The paper describes the impact of quantum computing technology on classical cryptography, particularly on public-key cryptographic systems. This paper also introduces adoption challenges associated with post-quantum cryptography after the standardization process is completed. Planning requirements for migration to post-quantum cryptography are discussed. The paper concludes with NIST’s next steps for helping with the migration to post-quantum cryptography.

Loading
loading...

Post-Quantum Cryptographic Algorithms

June 11, 2020
[email protected]

CLICK ON IMAGE

Comments due June 30th.

CLICK HERE for information about how to submit comments.   We maintain NIST activity on the standing agenda of our Federal Action teleconferences.   See our CALENDAR for the next online meeting; open to everyone.

Layout mode
Predefined Skins
Custom Colors
Choose your skin color
Patterns Background
Images Background
Skip to content