One of the Greatest Cybersecurity Challenges in the Next Decade … Post Quantum Cryptography

--

And, so our current public key encryption methods will be gently (or forceably, in some cases) be removed over the next decade or so. It will so changes to Web browsers, encryption methods, key exchange, digital signature, and so much more. Organisations thus need to think deeply about there migtration, and seek all the areas that involve our current public encryption methods. We will thus say goodbye to our fix on RSA, ECC (Elliptic Curve Cryptography) and Discrete Logs (such as the Diffie Hellman method). Out will go ECDH for handshaking, RSA/ECC for encryption, and ECDSA and EdDSA for digital signing, and in will come the PQCs (Post Quantum Cryptography) methods.

The are two main areas that will be developed:

  • KEM (Key Encapsulation Method)/Public Key. This will replace ECDH and our public key encryption methods.
  • Digital Signing. This will replace ECDSA and EdDSA.

KEM/Public Key

And, so, rather than get into all the detail, I have analysed the current contenders for KEM. For this I ran a test on a Linux machine, and gained the results for key generation, key encapsulation (Bob creates the key and encapsulates it for Alice), and key decapsulation (Alice reveals with key). I have…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.