PQC

Post-Quantum Cryptography: Defending Against Tomorrow’s Threats Today
By performing a cryptographic key assessment (CKA), developing a PQC encryption strategy and prioritizing cryptoagility, organizations can prepare for quantum computing cyberthreats. ...
Security Boulevard
Google’s Willow Chip: Another Push to Start Your Post-Quantum Cryptography (PQC) Preparation Now
Krupa Patil | | crypto-agility, Cryptography Bill of Materials (CBOM), Post-Quantum Cryptography, PQC, PQC transition, Public Key Infrastructure (PKI), quantum computing
As 2024 drew to a close, Google caught global attention with the announcement of its latest quantum computing chip, Willow. Many believe that with Willow, Google has set a new benchmark for ...
Navigating the Future of Secure Code Signing and Cryptography
In today’s interconnected world, the integrity of software has never been more critical. With the increasing reliance on open-source components and the complexities introduced by containerized applications, ensuring trust in software has ...
Key Takeaways from the Latest NIST Guidance on Transitioning to Post-Quantum Cryptography
AppViewX | | certificate lifecycle management, code signing, DSA, ECDH, ECDSA, NIST, PQC, PQC-ready certificates, rsa
NIST recently released an Initial Public Draft (IPD) report on transitioning from traditional public-key cryptographic algorithms to standardized post-quantum cryptography (PQC). This report details NIST’s roadmap for the PQC adoption, including timelines ...

Practical Advice for PQC Migration for TLS 1.3
Dr. Angelique Faye Loe | | certificate lifecycle management, crypto-agility, cryptographic solutions, cryptography, NIST, PKI, Post-Quantum Cryptography, PQC, quantum computing, TLS 1.3, TLS certificate, x.509 certificates
Numerous blogs and articles are urging security professionals to start migrating to quantum-resistant algorithms immediately. This urgency was heightened on August 13, 2024, when NIST finalized the FIPS 203 (ML-KEM), FIPS 204 ...
What You Need to Know About “Harvest-Now, Decrypt-Later” Attacks
Krupa Patil | | certificate lifecycle management (CLM), crypto-agility, Cryptographic Bill of Materials (CBOM), cryptography, PQC, PQC encryption algorithm standards, PQC readiness, rsa
As quantum computing leapfrogs at great speed, the spotlight is now on post-quantum cryptography (PQC). Recently, NIST released the first three PQC encryption algorithm standards, urging organizations to test the new algorithms ...
Understanding Quantum Threats and How to Secure Data with Post-Quantum Cryptography
Sanjay Kumaar V S | | cryptographic systems, cryptography, encryption, PQC, PQC algorithms, Public Key Cryptography, quantum computing, Quantum Mechanics, rsa
Post-Quantum Cryptography (PQC) is a new generation of encryption algorithms for protecting data against powerful quantum computers. Quantum computers use quantum mechanics to solve complex problems much faster than traditional computers. With ...

Quantum Computing and the Risk to Classical Cryptography
Dr. Angelique Faye Loe | | Advanced Encryption Standard, certificate lifecycle management, crypto-agility, cryptography, NIST, PKI, PQC, quantum computing, SHA-1, SHA-2
The recent standardization of first three post-quantum cryptography (PQC) encryption and digital signature algorithms by the U.S. National Institute of Standards and Technology (NIST) has officially kicked off the race to PQC ...

What Is a Cryptographic Bill of Materials or CBOM?
Dr. Angelique Faye Loe | | Cryptography Bill of Materials, National Institute of Standards (NIST), OpenSSL component, PKI, PQC, PQC standards, SBOM
Cryptography is now more intertwined with software development and DevOps processes. Therefore, best practices and policies for managing elements of the cryptographic portfolio, such as PKI and certificate lifecycle management, throughout the ...

NIST Releases Post Quantum Cryptography Standards
The National Institute of Standards and Technology (NIST) released its first three post-quantum cryptography (PQC) standards, a world-first designed to meet the threat of powerful quantum computers as well as the increasing ...
Security Boulevard