NIST Selects Four Encryption Algorithms To Counter Future Attacks On Quantum Computers

Share post:

The Department of Commerce’s National Institute of Standards and Technology (NIST) has selected four encryption algorithms to withstand future quantum computer attacks.

The four encryption algorithms include CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON and SPHINCS+. The four algorithms were created by experts from several countries and institutions.

The algorithms are designed with two main objectives associated with encryption use. This include general encryption and digital signatories. General encryption is used to protect information exchanged over a public network, while digital signatures are used for identity authentication.

NIST divided the algorithms into the two targets and selected CRYSTALS-Kyber algorithm under general encryption and the other three CRYSTALS-Dilithium, FALCON and SPHINCS + under digital signatories.

General encryption is used when secure websites are accessed. Among the advantages CRYSTALS-Kyber offers in this respect are small encryption keys that can be easily exchanged between two parties, and the speed of operation.

The sources for this piece include an article in TechRepublic.

SUBSCRIBE NOW

Related articles

New macOS Malware Exploits Apple’s Security Features to Stay Hidden and Steal User Data

A newly discovered variant of the Banshee macOS Stealer malware is putting 100 million Apple users at risk...

Microsoft MFA Outage Blocks Access to Microsoft 365 Apps, Raising Cloud Reliability Concerns

Microsoft faced another significant service disruption over the weekend, with a Multi-Factor Authentication (MFA) outage that blocked users...

Cyber Attack Hits Key Dutch University, Raising Concerns for Chip Giant ASML

Eindhoven University of Technology, a critical partner for semiconductor giant ASML Holding NV, has been hit by a...

Anthropic’s AI Agents Take a Big Leap: Direct Computer Control

Anthropic has unveiled a groundbreaking capability for its Claude large language model: the ability to directly interact with...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways