NIST has been focused on the development of post-quantum cryptographic algorithms since 2016 due to concerns that large-scale quantum computers could deconstruct current public-key cryptosystems. Peter Gutmann argues that, as of now, quantum computers have not successfully factored numbers larger than 21 and views them as experimental rather than practical products. NIST's initiatives include creating quantum-resistant algorithms such as HQC, CRYSTALS-Kyber, and others to mitigate risks associated with future quantum capabilities, specifically the threat of Shor's algorithm breaking existing encryption standards.
The US National Institute for Standards and Technology (NIST) has been advocating for post-quantum cryptographic algorithms since 2016 to prepare for potential quantum computing threats.
Quantum computers are viewed by some experts as experimental, having not yet demonstrated the ability to factor numbers greater than 21.
NIST's development of quantum-resistant encryption, such as HQC and CRYSTALS, is aimed at safeguarding data against possible vulnerabilities posed by future quantum computing capabilities.
If quantum computers run Shor's algorithm effectively, they could break traditional public-key encryption methods, threatening data security.
Collection
[
|
...
]