Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Applied Quantum Safe Security
Applied Quantum Safe Security

Applied Quantum Safe Security

Release Date: 03/13/2017

Working Group: Quantum-safe Security

Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Government security agencies have called for a move to quantum-safe cryptographic schemes. Standardization bodies such as ETSI, NIST, and ISO have started investigating the need for new, global standards. The consensus is clear: the cryptographic foundation that underlies today’s cybersecurity solutions needs to be retooled sooner rather than later, and the transition to quantum-safe security must begin now. Although the arrival date for a practical quantum computer is still in debate, experts believe we will see a quantum computer capable of breaking current public key cryptosystems within five to fifteen years. The aim of this white paper is to provide individuals in the security industry and related fields with applicable knowledge regarding the quantum computer and its influence on cyber security.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
AI Risk Management: Thinking Beyond Regulatory Boundaries
AI Risk Management: Thinking Beyond Regulatory ...
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
The Lost Art of Visibility, in the World of Clouds
The Lost Art of Visibility, in the World of Clouds
Published: 11/20/2024
CSA Community Spotlight: Addressing Emerging Security Challenges with CISO Pete Chronis
CSA Community Spotlight: Addressing Emerging Security Challenges wi...
Published: 11/18/2024
Group-Based Permissions and IGA Shortcomings in the Cloud
Group-Based Permissions and IGA Shortcomings in the Cloud
Published: 11/18/2024
9 Tips to Simplify and Improve Unstructured Data Security
9 Tips to Simplify and Improve Unstructured Data Security
Published: 11/18/2024

Acknowledgements

Frank Guanco
Frank Guanco
Research Program Manager, CSA

Frank Guanco

Research Program Manager, CSA

Bruno Huttner
Bruno Huttner

Bruno Huttner

Bruno has co-chaired CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for protecting their networks and their data, for approximately six years. As such, he has participated in writing most of the group’s research papers and has given several presentations about the group’s work. Bruno joined ID Quantique in 2014, where he’s r...

Read more

Ryan Bergsma
Ryan Bergsma
Technology Director and Security Manager, CSA

Ryan Bergsma

Technology Director and Security Manager, CSA

Ludovic Perret
Ludovic Perret
Co-founder

Ludovic Perret

Co-founder

Ludovic is co-chair for CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for protecting their networks and their data.

Ludovic is associate professor at Sorbonne University and co-founder of CryptoNext Security. Ludovic has expertise in the design, analysis and deployment of post-quantum cryptography and has publishe...

Read more

Dan Hiestand Headshot Missing
Dan Hiestand

Dan Hiestand

Lee Wilson Headshot Missing
Lee Wilson

Lee Wilson

Tom Brennan Headshot Missing
Tom Brennan

Tom Brennan

Xu Lei Headshot Missing
Xu Lei

Xu Lei

Larry Ramos Headshot Missing
Larry Ramos

Larry Ramos

Rino Sanchez Headshot Missing
Rino Sanchez

Rino Sanchez

Victor Chin Headshot Missing
Victor Chin

Victor Chin

Jane Melia Headshot Missing
Jane Melia

Jane Melia

Roberta Faux Headshot Missing
Roberta Faux

Roberta Faux

Sauvik Bhattacharya Headshot Missing
Sauvik Bhattacharya

Sauvik Bhattacharya

Jens Jensen Headshot Missing
Jens Jensen

Jens Jensen

Xinhua Ling Headshot Missing
Xinhua Ling

Xinhua Ling

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training