{"id":22465,"date":"2022-07-08T19:12:09","date_gmt":"2022-07-08T19:12:09","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22465"},"modified":"2022-07-08T19:12:11","modified_gmt":"2022-07-08T19:12:11","slug":"quantum-safe-cryptography-standards","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/","title":{"rendered":"New Quantum-safe Cryptography Standards Arrive None Too Soon"},"content":{"rendered":"\n<p>A six-year quantum cryptography competition just ended, producing <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2022\/07\/nist-announces-first-four-quantum-resistant-cryptographic-algorithms\" target=\"_blank\" rel=\"noreferrer noopener\">four new security standards<\/a> selected by the U.S. Department of Commerce\u2019s National Institute of Standards and Technology.<\/p>\n\n\n\n<p>The announcement comes on the heels of a few major strides in quantum computing accessibility and speed\u2014and may hopefully stave off the growing quantum security threat.<\/p>\n\n\n\n<p>The NIST contest began in 2016, with the goal of improving general <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">encryption<\/a> and digital signatures. The four new security standards selected by NIST will become part of a quantum-safe cryptography standard released as soon as 2024. But these new standards can\u2019t come soon enough.<\/p>\n\n\n\n<p>Quantum technology is accelerating\u2014and with it, the quantum threat. 2022 has seen startups with quantum-as-a-service (QaaS) solutions, leading companies partnering to create <a href=\"https:\/\/qutech.nl\/2022\/07\/05\/qutech-eurofiber-juniper-deploy-quantum-testbed\/\" target=\"_blank\" rel=\"noreferrer noopener\">interconnected quantum computing networks<\/a>, and major world powers competing to become the <a href=\"https:\/\/thehill.com\/opinion\/cybersecurity\/3520574-what-chinas-targeting-of-us-telecoms-means-for-post-quantum-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">leaders of quantum technology<\/a>.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/encryption-guide\/\">Encryption: How It Works, Types, and the Quantum Future<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Quantum Computing is Already Here<\/h2>\n\n\n\n<p>Any science-fiction premise becomes exponentially less outlandish when it\u2019s sold as-a-service. UK-based Oxford Quantum Circuits just raised roughly $47 million in <a href=\"https:\/\/oxfordquantumcircuits.com\/oqc-series-a-38-million\" target=\"_blank\" rel=\"noreferrer noopener\">Series A funding<\/a> for its Quantum-as-a-Service platform, with the goal of putting quantum processing in the hands of everyone. But it\u2019s not unique.<\/p>\n\n\n\n<p>Amazon\u2019s Braket quantum computing marketplace became <a href=\"https:\/\/aws.amazon.com\/about-aws\/whats-new\/2020\/08\/quantum-computing-available-aws-through-amazon-braket\/\" target=\"_blank\" rel=\"noreferrer noopener\">publicly available in 2020<\/a>\u2014a mere five years after IBM launched the first <a href=\"https:\/\/research.ibm.com\/blog\/quantum-five-years\" target=\"_blank\" rel=\"noreferrer noopener\">quantum computer on the cloud<\/a>. Meanwhile, QuTech, Eurofiber, and Juniper Networks may be on their way to creating the first quantum internet.<\/p>\n\n\n\n<p>Technological acceleration can happen in the blink of an eye. Two years ago, IBM released its <a href=\"https:\/\/newsroom.ibm.com\/2021-11-16-IBM-Unveils-Breakthrough-127-Qubit-Quantum-Processor\" target=\"_blank\" rel=\"noreferrer noopener\">Eagle quantum computer<\/a>\u2014at the time, the world\u2019s fastest quantum computer\u2014with 127 qubits of processing speed. Over the next few years, IBM intends to release the 433-qubit Quantum Osprey, followed swiftly by the 1,121-qubit Quantum Condor.<\/p>\n\n\n\n<p>Similarly, last month, Quantinuum\u2019s System Model H1 quantum computer <a href=\"https:\/\/www.honeywell.com\/us\/en\/news\/2022\/06\/what-reaching-20-qubits-means-for-quantum-computing\" target=\"_blank\" rel=\"noreferrer noopener\">broke a quantum milestone<\/a>, processing 20 qubits of data\u2014a tremendous upgrade from the previous 12. JP Morgan Chase used the quantum computer to develop an algorithm for natural language processing. As new technologies emerge, acceleration is occurring at all layers of the quantum computing industry.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/hot-cybersecurity-startups\/\">Top Cybersecurity Startups to Watch in 2022<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Coming Quantum Security Meltdown<\/h2>\n\n\n\n<p>Quantum computing has tremendous implications for the fields of natural language processing, machine learning, and artificial intelligence. When computers are able to \u201cthink\u201d extraordinarily fast, they can also think with incredible depth and complexity. However, this introduces significant security risks: What happens when a malicious application can think and adapt much faster than the <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">leading security solutions<\/a>?<\/p>\n\n\n\n<p>And for encryption, the problem is just as much thought as it is raw power. With enough raw power, anything can be broken.<\/p>\n\n\n\n<p>Those in the security industry have known for some time that quantum computing <em>will<\/em> break our current security standards. Earlier in the week, Toshiba <a href=\"https:\/\/www.prnewswire.com\/news-releases\/toshiba-safe-quantum-enter-agreement-to-accelerate-quantum-communication-solutions-in-north-america-301580058.html\" target=\"_blank\" rel=\"noreferrer noopener\">partnered with Safe Quantum<\/a> to develop new quantum key distribution and quantum communications technologies.<\/p>\n\n\n\n<p>According to the CEO and founder of Safe Quantum, John Prisco, \u201c2022 will mark the year we see commercial quantum technology really take off, as more innovators see the future quantum-secure world as the ultimate way to protect data.\u201d<\/p>\n\n\n\n<p>But with many enterprises still struggling with the skills gap introduced by the cloud, quantum computing has been sidelined by all but the most visionary.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ai-ml-cybersecurity\/\">AI &amp; ML Cybersecurity: The Latest Battleground for Attackers &amp; Defenders<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IBM Experts Pave the Way Toward Quantum-Safe Cryptography<\/h2>\n\n\n\n<p>For years, IBM has been building a team of the best cryptographic experts in the world\u2014with the express purpose of developing quantum-safe schemes. By adopting new, quantum-safe cryptography standards <em>before<\/em> quantum technology becomes readily available, enterprises hope to keep their data safe at least until the next major technological advancement\u2014and the next significant threat.<\/p>\n\n\n\n<p>Just as an eight-digit password was once considered nigh-unbreakable through brute force tactics, quantum computing has the potential of rendering our current cryptography and security meaningless. Large-scale, practical quantum computing could easily crack today\u2019s cryptographic standards. Even worse, quantum computing can \u201creach into the past\u201d\u2014data stolen today may be vulnerable to quantum threat tomorrow.<\/p>\n\n\n\n<p>It\u2019s hoped that the new NIST standards, including those developed by IBM, will let organizations prepare for future quantum threats and protect today\u2019s data against the challenges of the future. Companies concerned about becoming quantum-ready can engage with IBM\u2019s new, dedicated <a href=\"https:\/\/newsroom.ibm.com\/2022-05-10-IBM-Unveils-New-Roadmap-to-Practical-Quantum-Computing-Era-Plans-to-Deliver-4,000-Qubit-System\" target=\"_blank\" rel=\"noreferrer noopener\">IBM Quantum-Safe portfolio<\/a> of technologies and consulting services.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/rainbow-table-attack\/\">Rainbow Table Attacks and Cryptanalytic Defenses<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New NIST Standards Will Be Published in 2024<\/h2>\n\n\n\n<p>NIST&#8217;s new post-quantum cryptographic standards won\u2019t be published for commercial use until 2024. However, organizations are urged to <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/07\/05\/prepare-new-cryptographic-standard-protect-against-future-quantum\" target=\"_blank\" rel=\"noreferrer noopener\">start their preparations now<\/a> by auditing their current systems and testing the new cryptographic standards in a <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/sandboxing-advanced-malware-analysis\/\">sandbox environment<\/a>.<\/p>\n\n\n\n<p>Four additional algorithms are also under consideration for inclusion in the standard, and NIST will announce finalists from that round at a future date.<\/p>\n\n\n\n<p>Among the four standards released this week, for <strong>general encryption<\/strong>, NIST has selected the <a href=\"https:\/\/pq-crystals.org\/kyber\/index.shtml\" target=\"_blank\" rel=\"noreferrer noopener\">CRYSTALS-Kyber<\/a> algorithm, which offers comparatively small encryption keys and speed of operation.\u00a0<\/p>\n\n\n\n<p>For <strong>digital signatures<\/strong>, NIST has selected three algorithms: <a href=\"https:\/\/pq-crystals.org\/dilithium\/index.shtml\" target=\"_blank\" rel=\"noreferrer noopener\">CRYSTALS-Dilithium<\/a>, <a href=\"https:\/\/falcon-sign.info\/\" target=\"_blank\" rel=\"noreferrer noopener\">FALCON<\/a> and <a href=\"https:\/\/sphincs.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">SPHINCS+<\/a>. The first two offer high efficiency. NIST recommends CRYSTALS-Dilithium as the primary algorithm, with FALCON for applications that need smaller signatures than Dilithium can provide.<\/p>\n\n\n\n<p>The third, SPHINCS+, is &#8220;somewhat larger and slower than the other two, but it is valuable as a backup for one chief reason: It is based on a different math approach than all three of NIST\u2019s other selections,&#8221; the agency said.<\/p>\n\n\n\n<p>NIST said three of the algorithms are based on a family of math problems called structured lattices, while SPHINCS+ uses hash functions.<\/p>\n\n\n\n<p>Between now and 2024, it\u2019s still possible that these new cryptographic standards could change. With the world of quantum computing moving incredibly fast, cryptographic standards must move quickly, too. And as organizations adapt to the new, post-quantum cryptographic standards, they must also ready themselves for one of the most momentous shifts in the history of computing.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-outlook-2022-ransomware-and-ai-attacks\/\">Cybersecurity Outlook 2022: Third-Party, Ransomware and AI Attacks Will Get Worse<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d9ea23573-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d9ea23573\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d9ea23573\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d9ea23573\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d9ea23573\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d9ea23573\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d9ea23573\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A six-year quantum cryptography competition just ended, producing four new security standards selected by the U.S. Department of Commerce\u2019s National Institute of Standards and Technology. The announcement comes on the heels of a few major strides in quantum computing accessibility and speed\u2014and may hopefully stave off the growing quantum security threat. The NIST contest began [&hellip;]<\/p>\n","protected":false},"author":282,"featured_media":19725,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[2369,860,3414,730,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[383,375,392],"class_list":["post-22465","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-cloud-security","tag-encryption","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-encryption-data-loss-prevention","b2b_product-security-management","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Quantum-safe Cryptography Standards Arrive None Too Soon | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Quantum computing is coming, and with it tremendous security threats - even data stolen today can be decrypted later.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Quantum-safe Cryptography Standards Arrive None Too Soon | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Quantum computing is coming, and with it tremendous security threats - even data stolen today can be decrypted later.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-08T19:12:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-08T19:12:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/06\/ESP.EncryptionUpdate-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1735\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jenna Inouye\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Inouye\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/\"},\"author\":{\"name\":\"Jenna Inouye\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3e587fc16bf8bd7d57b2f2783f89f321\"},\"headline\":\"New Quantum-safe Cryptography Standards Arrive None Too Soon\",\"datePublished\":\"2022-07-08T19:12:09+00:00\",\"dateModified\":\"2022-07-08T19:12:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/\"},\"wordCount\":1004,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/06\/ESP.EncryptionUpdate-scaled.jpg\",\"keywords\":[\"cloud security\",\"encryption\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/\",\"name\":\"New Quantum-safe Cryptography Standards Arrive None Too Soon | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/06\/ESP.EncryptionUpdate-scaled.jpg\",\"datePublished\":\"2022-07-08T19:12:09+00:00\",\"dateModified\":\"2022-07-08T19:12:11+00:00\",\"description\":\"Quantum computing is coming, and with it tremendous security threats - even data stolen today can be decrypted later.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/06\/ESP.EncryptionUpdate-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/06\/ESP.EncryptionUpdate-scaled.jpg\",\"width\":2560,\"height\":1735,\"caption\":\"Encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Quantum-safe Cryptography Standards Arrive None Too Soon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3e587fc16bf8bd7d57b2f2783f89f321\",\"name\":\"Jenna Inouye\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Profile-Pic-Jenna-1-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Profile-Pic-Jenna-1-150x150.jpg\",\"caption\":\"Jenna Inouye\"},\"description\":\"Full-stack developer and technology writer with bylines in Hackr.io, Udemy, and SVG. Technology writer at First Page Sage, a leading SEO firm.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jinouye\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Quantum-safe Cryptography Standards Arrive None Too Soon | eSecurity Planet","description":"Quantum computing is coming, and with it tremendous security threats - even data stolen today can be decrypted later.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/","og_locale":"en_US","og_type":"article","og_title":"New Quantum-safe Cryptography Standards Arrive None Too Soon | eSecurity Planet","og_description":"Quantum computing is coming, and with it tremendous security threats - even data stolen today can be decrypted later.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/","og_site_name":"eSecurity Planet","article_published_time":"2022-07-08T19:12:09+00:00","article_modified_time":"2022-07-08T19:12:11+00:00","og_image":[{"width":2560,"height":1735,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/06\/ESP.EncryptionUpdate-scaled.jpg","type":"image\/jpeg"}],"author":"Jenna Inouye","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Inouye","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/"},"author":{"name":"Jenna Inouye","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3e587fc16bf8bd7d57b2f2783f89f321"},"headline":"New Quantum-safe Cryptography Standards Arrive None Too Soon","datePublished":"2022-07-08T19:12:09+00:00","dateModified":"2022-07-08T19:12:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/"},"wordCount":1004,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/06\/ESP.EncryptionUpdate-scaled.jpg","keywords":["cloud security","encryption","network security","security","Web security"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/","url":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/","name":"New Quantum-safe Cryptography Standards Arrive None Too Soon | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/06\/ESP.EncryptionUpdate-scaled.jpg","datePublished":"2022-07-08T19:12:09+00:00","dateModified":"2022-07-08T19:12:11+00:00","description":"Quantum computing is coming, and with it tremendous security threats - even data stolen today can be decrypted later.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/06\/ESP.EncryptionUpdate-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/06\/ESP.EncryptionUpdate-scaled.jpg","width":2560,"height":1735,"caption":"Encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/quantum-safe-cryptography-standards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"New Quantum-safe Cryptography Standards Arrive None Too Soon"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3e587fc16bf8bd7d57b2f2783f89f321","name":"Jenna Inouye","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Profile-Pic-Jenna-1-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/Profile-Pic-Jenna-1-150x150.jpg","caption":"Jenna Inouye"},"description":"Full-stack developer and technology writer with bylines in Hackr.io, Udemy, and SVG. Technology writer at First Page Sage, a leading SEO firm.","url":"https:\/\/www.esecurityplanet.com\/author\/jinouye\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22465"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/282"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22465"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22465\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19725"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22465"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22465"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22465"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}