Page 40 - Cyber Defense eMagazine September 2025
P. 40
email signatures, OS and app code-signing, and even blockchain wallets or smart contracts.
Until those systems migrate to post-quantum algorithms, they may become redundant soon.
What is Post Quantum Cryptography?
Simply put, post-quantum cryptography helps you address the threats posed by quantum computing. You
don’t have to worry about Shor’s algorithm in conjunction with a quantum computer breaking traditional
encryption algorithms. Your quantum-resistant algorithm will keep this threat at bay.
The three categories of quantum-risk resistant solutions include:
• Post-Quantum Cryptography: These are new math-based public-key quantum-resistant
algorithms.
• Quantum Key Distribution: This framework is supported by quantum physics for secure
communication channels that share symmetric cryptography keys.
• Quantum Random Number Generation: This framework fuels randomness for building robust
security protocols.
NIST, or the National Institute of Standards and Technology (NIST), has already come out with a list of
post-quantum cryptographic standards primarily covering key exchange and digital signatures. This
includes Federal Information Processing Standards (FIPS):
• FIPS 203: This standard, based on ML-KEM (Module-Lattice-Based Key-Encapsulation
Mechanism), focuses on general encryption, and is underpinned by small encryption keys that
can be shared easily by two parties
• FIPS 204: This standard, based on ML-DSA (Module-Lattice-Based Digital Signature Algorithm),
focuses on protecting digital signatures.
• FIPS 205: This standard based on SLH-DSA (Stateless Hash-Based Digital Signature Algorithm),
also focuses on digital signatures; the difference being the math approach. If ML-DSA is broken
into, this algorithm is the backup.
What does a Quantum Threat Cybersecurity Roadmap look like?
CISOs must start the process to achieve a post-quantum cybersecurity posture today. While different
threat timelines offer different estimates, there is no doubt that quantum threats are real and about to
arrive.
Here’s a roadmap you can use to achieve readiness:
Cyber Defense eMagazine – September 2025 Edition 40
Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.