Agenda
1. Understanding the Quantum Computer Threats
- In the 1990s, Shor’s algorithm demonstrated that if we have sufficient quantum computing power, asymmetric cryptography will no longer be secure.
- Asymmetric cryptography is widely used on the internet, for example: authentication, key exchange, and digital signatures.
- NIST began the PQC algorithm selection process in 2016, and announced three PQC algorithms in August 2023.
- FIPS203: Kyber a.k.a. ML-KEM (Module-Lattice Key Encapsulation Algorithm)
- FIPS204: Dilithium a.k.a. ML-DSA (Module-Lattice Digital Signature Algorithm)
- FIPS205: SPHINCS a.k.a. SLH-DSA (Stateless Hash-based Digital Signature Algorithm)
- Falcon draft following in several months
Know more about Quantum threat?
Prominent cryptographer Tanja Lange's presentation slides from QSMC:
https://hyperelliptic.org/tanja/vortraege/20230926-pqc-migration.pdf
2. Evaluating Your Service's Vulnerability to Quantum Threats
Visit **https://pqscan.io/**, enter your service, and get it checked within seconds.
As shown in the image, the KEX field indicates the algorithm is not Quantum safe. In the next section, we will guide you to start the migration process.
Is your service on an intranet?
No problem, please contact [email protected]. We offer enterprise service solutions to scan in your private environment.