Page 40 - Cyber Defense eMagazine September 2025
P. 40

email  signatures,  OS  and  app  code-signing,  and  even  blockchain  wallets  or  smart  contracts.

            Until those systems migrate to post-quantum algorithms, they may become redundant soon.



            What is Post Quantum Cryptography?

            Simply put, post-quantum cryptography helps you address the threats posed by quantum computing. You
            don’t have to worry about Shor’s algorithm in conjunction with a quantum computer breaking traditional
            encryption algorithms. Your quantum-resistant algorithm will keep this threat at bay.

            The three categories of quantum-risk resistant solutions include:

               •  Post-Quantum  Cryptography:  These  are  new  math-based  public-key  quantum-resistant
                   algorithms.
               •  Quantum  Key  Distribution:  This  framework  is  supported  by  quantum  physics  for  secure
                   communication channels that share symmetric cryptography keys.
               •  Quantum Random Number Generation: This framework fuels randomness for building robust
                   security protocols.

            NIST, or the National Institute of Standards and Technology (NIST), has already come out with a list of
            post-quantum  cryptographic  standards  primarily  covering  key  exchange  and  digital  signatures.  This
            includes Federal Information Processing Standards (FIPS):

               •  FIPS  203:  This  standard,  based  on  ML-KEM  (Module-Lattice-Based  Key-Encapsulation
                   Mechanism), focuses on general encryption, and is underpinned by small encryption keys that
                   can be shared easily by two parties
               •  FIPS 204: This standard, based on ML-DSA (Module-Lattice-Based Digital Signature Algorithm),
                   focuses on protecting digital signatures.
               •  FIPS 205:  This standard based on SLH-DSA (Stateless Hash-Based Digital Signature Algorithm),
                   also focuses on digital signatures; the difference being the math approach. If ML-DSA is broken
                   into, this algorithm is the backup.



            What does a Quantum Threat Cybersecurity Roadmap look like?

            CISOs must start the process to achieve a post-quantum cybersecurity posture today. While different
            threat timelines offer different estimates, there is no doubt that quantum threats are real and about to
            arrive.

            Here’s a roadmap you can use to achieve readiness:










            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          40
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   35   36   37   38   39   40   41   42   43   44   45