Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Applied Quantum Safe Security
Applied Quantum Safe Security

Applied Quantum Safe Security

Release Date: 03/13/2017

Working Group: Quantum-safe Security

Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Government security agencies have called for a move to quantum-safe cryptographic schemes. Standardization bodies such as ETSI, NIST, and ISO have started investigating the need for new, global standards. The consensus is clear: the cryptographic foundation that underlies today’s cybersecurity solutions needs to be retooled sooner rather than later, and the transition to quantum-safe security must begin now. Although the arrival date for a practical quantum computer is still in debate, experts believe we will see a quantum computer capable of breaking current public key cryptosystems within five to fifteen years. The aim of this white paper is to provide individuals in the security industry and related fields with applicable knowledge regarding the quantum computer and its influence on cyber security.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
How to Prepare Your Workforce to Secure Your Cloud Infrastructure with Zero Trust
How to Prepare Your Workforce to Secure Your Cloud Infrastructure w...
Published: 04/24/2024
Neutralizing the Threat with Cloud Remediation
Neutralizing the Threat with Cloud Remediation
Published: 04/23/2024
10 Tips to Guide Your Cloud Email Security Strategy
10 Tips to Guide Your Cloud Email Security Strategy
Published: 04/17/2024
The Widening Overlap Between Cloud Workloads and Cybersecurity
The Widening Overlap Between Cloud Workloads and Cybersecurity
Published: 04/17/2024

Acknowledgements

Frank Guanco
Frank Guanco
Research Program Manager, CSA

Frank Guanco

Research Program Manager, CSA

This person does not have a biography listed with CSA.

Bruno Huttner
Bruno Huttner

Bruno Huttner

Bruno has co-chaired CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for protecting their networks and their data, for approximately six years. As such, he has participated in writing most of the group’s research papers and has given several presentations about the group’s work. Bruno joined ID Quantique in 2014, where he’s r...

Read more

Ryan Bergsma
Ryan Bergsma
Technology Director and Security Manager, CSA

Ryan Bergsma

Technology Director and Security Manager, CSA

This person does not have a biography listed with CSA.

Ludovic Perret
Ludovic Perret
Co-founder

Ludovic Perret

Co-founder

Ludovic is co-chair for CSA’s Quantum-Safe Security working group, which was formed to address key generation and transmission methods and help the industry understand quantum‐safe methods for protecting their networks and their data.

Ludovic is associate professor at Sorbonne University and co-founder of CryptoNext Security. Ludovic has expertise in the design, analysis and deployment of post-quantum cryptography and has publishe...

Read more

Dan Hiestand Headshot Missing
Dan Hiestand

Dan Hiestand

This person does not have a biography listed with CSA.

Lee Wilson Headshot Missing
Lee Wilson

Lee Wilson

This person does not have a biography listed with CSA.

Tom Brennan Headshot Missing
Tom Brennan

Tom Brennan

This person does not have a biography listed with CSA.

Xu Lei Headshot Missing
Xu Lei

Xu Lei

This person does not have a biography listed with CSA.

Larry Ramos Headshot Missing
Larry Ramos

Larry Ramos

This person does not have a biography listed with CSA.

Rino Sanchez Headshot Missing
Rino Sanchez

Rino Sanchez

This person does not have a biography listed with CSA.

Victor Chin Headshot Missing
Victor Chin

Victor Chin

This person does not have a biography listed with CSA.

Jane Melia Headshot Missing
Jane Melia

Jane Melia

This person does not have a biography listed with CSA.

Roberta Faux Headshot Missing
Roberta Faux

Roberta Faux

This person does not have a biography listed with CSA.

Sauvik Bhattacharya Headshot Missing
Sauvik Bhattacharya

Sauvik Bhattacharya

This person does not have a biography listed with CSA.

Jens Jensen Headshot Missing
Jens Jensen

Jens Jensen

This person does not have a biography listed with CSA.

Xinhua Ling Headshot Missing
Xinhua Ling

Xinhua Ling

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training