NIST selects 4 post-quantum cryptographic algorithms.

  /     /     /  
Publicated : 26/11/2024   Category : security


NIST Picks 4 Quantum-Resistant Cryptographic Algorithms

What is NIST?

The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. It is responsible for developing technology, measurements, and standards to promote economic growth and innovation.

Why did NIST choose quantum-resistant cryptographic algorithms?

Quantum computers have the potential to break conventional cryptographic algorithms, posing a threat to data security. NISTs decision to select quantum-resistant cryptographic algorithms is a proactive measure to ensure the security of sensitive information.

What are the 4 chosen quantum-resistant cryptographic algorithms?

1. Hash-Based Signatures 2. Lattice-Based Signatures 3. Multivariable Quadratic Equations 4. Code-Based Signatures

People Also Ask

What are hash-based signatures?

Hash-based signatures are cryptographic algorithms that use hash functions to sign digital documents securely. They are considered to be quantum-resistant and are widely used for digital signatures.

What are lattice-based signatures?

Lattice-based signatures are cryptographic algorithms based on lattice problems in mathematics. They are considered to be secure against quantum attacks and are being studied for implementation in post-quantum cryptography.

What are multivariable quadratic equations?

Multivariable quadratic equations are mathematical equations involving multiple variables and quadratic terms. They are utilized in cryptographic algorithms as a form of security against quantum attacks.

What are code-based signatures?

Code-based signatures are cryptographic algorithms that rely on error-correcting codes for security. They are resistant to attacks from quantum computers and provide a reliable method for ensuring data integrity.


Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
NIST selects 4 post-quantum cryptographic algorithms.