Quantum computers are still a long way off, perhaps 5-10 years away or longer, but big businesses, especially banks and other financial institutions that rely on cryptographic techniques to protect sensitive customer data, cannot ignore the fact that a number of countries are investing heavily in developing post-quantum computing capabilities.
“ security for the next 20 to 30 years need to work on the cryptographic component. Their encryption methods need to be flexible and ready for the transition to post-quantum encryption. However, there is no need to rush into this yet,” Lindell said. He added that almost all modern encryption systems are not flexible enough, which automatically means that they do not provide the ability to quickly switch algorithms and encryption types if vulnerabilities are discovered in one of them.
The vulnerabilities may be due to the fact that encryption honduras mobile database lack low-level binding to specific algorithm types and names, and instead use software calls instead of centralized libraries of algorithms. “A library that provides cryptographic services to all of an organization’s code needs to work with high-level software calls. The cryptosystem needs to be flexible enough that switching from one algorithm to another should be reflected as a single change in the library,” Lindell said. He suggests two strategies for ensuring data is protected.
Organizations that need to ensure data
-
- Posts: 533
- Joined: Mon Dec 23, 2024 3:15 am