Countdown to Y2Q
|CSA Warns of Quantum Computing Risks with Countdown Clock||Cloud Computing||March 21, 2022|
|Google, Microsoft aim to make their cloud environments more secure as cyberattacks increase||CNBC||March 29, 2022|
|What's up with... Telecom Italia, Huawei, Iliad||TelecomTV||April 04, 2022|
|OpenSSH Bravely Addresses the Quantum Threat||Medium.com||April 11, 2022|
|Felderman: Congress must do more to bolster cybersecurity||Telegraph Herald||May 05, 2022|
Research around Securing Quantum Computing
CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.
A Day Without Safe Cryptography
Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transactions and communications are executed, enabling businesses, education, governments, and communities to thrive and prosper. Millions of new devices are connecting to the Internet, creating, processing, and transferring digital information in greater volumes and with greater velocity than ever imagined.
Practical Preparations for the Post-Quantum World
This document discusses the cybersecurity challenges and recommended steps to reduce likely new risks due to quantum information sciences. This paper was created for awareness and education, and to communicate example steps every organization should be performing to prepare for the post-quantum world. Part I is a discussion of the various quantum threats which require mitigation. Part II is an actionable, step-by-step, blueprint for preparing for the post-quantum world.
Confidence in Post Quantum Algorithm
NIST made the recent announcement of its Round 3 candidates for future post-quantum cryptography or quantum safe standards. As the world prepares to transition to post-quantum cryptography, it is essential to understand how much analysis has been done on the security of the individual post quantum algorithms and classes of algorithms.