One of the Greatest Cybersecurity Challenges in the Next Decade … Post Quantum Cryptography
And, so our current public key encryption methods will be gently (or forceably, in some cases) be removed over the next decade or so. It will so changes to Web browsers, encryption methods, key exchange, digital signature, and so much more. Organisations thus need to think deeply about there migtration, and seek all the areas that involve our current public encryption methods. We will thus say goodbye to our fix on RSA, ECC (Elliptic Curve Cryptography) and Discrete Logs (such as the Diffie Hellman method). Out will go ECDH for handshaking, RSA/ECC for encryption, and ECDSA and EdDSA for digital signing, and in will come the PQCs (Post Quantum Cryptography) methods.
The are two main areas that will be developed:
- KEM (Key Encapsulation Method)/Public Key. This will replace ECDH and our public key encryption methods.
- Digital Signing. This will replace ECDSA and EdDSA.
KEM/Public Key
And, so, rather than get into all the detail, I have analysed the current contenders for KEM. For this I ran a test on a Linux machine, and gained the results for key generation, key encapsulation (Bob creates the key and encapsulates it for Alice), and key decapsulation (Alice reveals with key). I have…