From the course: Modern Cloud Security: Shift-Left, Observability, and Automated Defense
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Preparing for post-quantum cryptography
From the course: Modern Cloud Security: Shift-Left, Observability, and Automated Defense
Preparing for post-quantum cryptography
- [Narrator] We learned that algorithms like RSA and ECC could become vulnerable. So the natural next question is what is being done about it? Recognizing the future threat, fesearchers and cryptographers worldwide have been working proactively for years to develop new encryption methods resistant to attacks from both classical and quantum computers. A major focus of this global effort is the standardization process led by the US National Institute of Standards and Technology known as NIST. Their goal is to select and standardize a new set of cryptographic algorithms suitable for widespread use. What makes these post-quantum algorithms different? They are based on different types of mathematical problems that are believed to be extremely difficult for both conventional computers and quantum computers to solve. Researchers have explored various approaches leading to categories like lattice-based cryptography, hash-based signatures, code-based cryptography, and others. Each category has…