NIST’s Post-Quantum Cryptography Program Enters ‘Selection Round’

NIST’s Post-Quantum Cryptography Program Enters ‘Selection Round’

Credit: B. Hayes/NIST




A select few algorithms, some of which fall into one of three mathematical "families," are undergoing a final leg of review. Some will form the core of the first post-quantum cryptography standard.

The race to protect sensitive electronic information against the threat of quantum computers has entered the home stretch. 


After spending more than three years examining new approaches to encryption and data protection that could defeat an assault from a quantum computer, the National Institute of Standards and Technology (NIST) has winnowed the 69 submissions it initially received down to a final group of 15. NIST has now begun the third round of public review. This “selection round” will help the agency decide on the small subset of these algorithms that will form the core of the first post-quantum cryptography standard. 


“At the end of this round, we will choose some algorithms and standardize them,” said NIST mathematician Dustin Moody. “We intend to give people tools that are capable of protecting sensitive information for the foreseeable future, including after the advent of powerful quantum computers.”


The latest details on the project appear in the Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process (NISTIR 8309), which was published today. NIST is asking experts to provide their input on the candidates in the report.


“We request that cryptographic experts everywhere focus their attention on these last algorithms,” Moody said. “We want the algorithms we eventually select to be as strong as possible.”


Classical computers have many strengths, but they find some problems intractable — such as ..

Support the originator by clicking the read the rest link below.