|
Quantum computing’s progress is expected to solve complex problems radically faster than today’s classical computers. That progress should eventually yield cryptographically relevant quantum computing (CRQC), at which point quantum systems can break today’s public key cryptography. In anticipation of this expected change, governments around the world are developing new national quantum readiness strategies, including requirements to migrate to new quantum resistant PQC standards. |
量子计算的进步有望比当今的传统计算机更快地解决复杂问题。这一进展最终将产生与密码学相关的量子计算(CRQC),届时量子系统可以打破当今的公钥密码学。为应对这一预期的变化,世界各国政府正在制定新的国家量子就绪战略,包括要求迁移到新的抗量子质量控制标准。 |
|
While the timeline for a capable quantum computer remains uncertain, enterprises are moving toward achieving cryptographic agility so they can adapt their inventory of cryptographic algorithms and practices without significantly disrupting the overall business operations. Cryptographic agility addresses the “brittleness” of today’s cryptographic infrastructure by enabling organizations to upgrade different cryptographic algorithms across applications, infrastructure, and hardware as standards, threats, and requirements change. There is no guarantee that today’s approved PQC algorithms or tomorrow’s future algorithms will provide the necessary security over time. And there are multiple PQC algorithms for different purposes. Crypto agility enables organizations to smoothly adapt without interrupting operations as the cryptography evolves. |
尽管功能强大的量子计算机的时间表仍不确定,但企业正在朝着实现加密敏捷性迈进,这样他们就可以在不严重干扰整体业务运营的情况下调整其加密算法和实践清单。加密敏捷性使组织能够随着标准、威胁和要求的变化升级应用程序、基础设施和硬件上的不同加密算法,从而解决当今加密基础设施的 “脆弱性”。无法保证当今批准的 PQC 算法或明天的未来算法会随着时间的推移提供必要的安全性。还有多种用于不同目的的 PQC 算法。随着密码学的发展,加密敏捷性使组织能够顺利适应而不会中断运营。 |
|
Enterprises need to consider expected changes in evolving from classical public-key cryptographic algorithms to standardized PQC. The U.S. National Institute of Standards and Technology (NIST) released an Initial Public Draft (IPD) report in November 2024 detailing the NIST roadmap for the PQC adoption, which includes aggressive timelines for deprecating (2030) and disallowing (2035) a broad range of currently used algorithms. NIST subsequently published the finalized PQC standards (FIPS 203, FIPS 204, and FIPS 205), which provide a clear framework as well as requirements. Commercial enterprises will eventually need to consider deploying updated cryptographic algorithms in anticipation of quantum threats targeting classic encryption algorithms. This upcoming change is particularly relevant to public sector and regulated industries like financial services and healthcare. |
在从传统的公钥加密算法向标准化PQC演变过程中,企业需要考虑预期的变化。美国国家标准与技术研究所(NIST)于2024年11月发布了初步公开草案(IPD)报告,详细介绍了NIST采用PQC的路线图,其中包括弃用(2030年)和禁止(2035年)目前使用的各种算法的严格时间表。NIST随后发布了最终的PQC标准(FIPS 203、FIPS 204和FIPS 205),这些标准提供了明确的框架和要求。商业企业最终将需要考虑部署更新的加密算法,以应对针对经典加密算法的量子威胁。这一即将到来的变化尤其与公共部门和金融服务和医疗保健等受监管行业有关。 |
|
Enterprises recognize the need to prepare for a PQC world, and the first step is getting visibility to their cryptographic inventory used for data in transit. Cryptographic assets permeate an enterprise environment, and organizations frequently struggle to identify all elements of their cryptographic technology. They then need to prepare to migrate that cryptographic infrastructure to emerging PQC standards for data in transit. |
企业认识到需要为PQC世界做好准备,第一步是了解用于传输数据的加密清单。加密资产渗透到企业环境中,组织经常难以识别其加密技术的所有元素。然后,他们需要做好准备,将加密基础设施迁移到新兴的 PQC 传输数据标准。 |