![]() ![]() Until this new suite is developed and products are available implementing the quantum resistant suite, we will rely on current algorithms. We are working with partners across the USG, vendors, and standards bodies to ensure there is a clear plan for getting a new suite of algorithms that are developed in an open and transparent manner that will form the foundation of our next Suite of cryptographic algorithms. Our ultimate goal is to provide cost effective security against a potential quantum computer. Based on experience in deploying Suite B, we have determined to start planning and communicating early about the upcoming transition to quantum resistant algorithms. IAD recognizes that there will be a move, in the not distant future, to a quantum resistant algorithm suite. NSA Preparing Quantum Resistant Encryption Algorithms I take that to mean the NSA can crack a 90 bit key.Ī challenge to that statement was made by a very experienced attendee, who stated that she questions whether a 256 bit key is adequate, and that her experience is that a 90 bit key is just ridiculous. There is no reason to have a key longer than 90 bits. ![]() So, when a spec indicates up to a certain level but not above, that means it has vulnerabilities.Īt the same workshop, during a panel discussion that included that same NSA person, during a discussion key lengths, he said: The subject was quickly changed then the workshop continued. He paused a moment, gave me a funny look, then asked one of his colleagues about it (no answer). Does that mean that it is not to be used for higher classifications? NIST specifies that AES can be used up to Top Secret.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |