• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • DesignFast
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Post-quantum crypto standardization — what’s next?

September 18, 2023 By Jeff Shepard

Analysis and possible pushback from users may be among the next steps in the development of post-quantum cryptography (PQC) by the National Institute of Standards and Technology (NIST). NIST has started the process of standardizing the four finalist algorithms. That’s the last step before developing the mathematical tools and making the tools available so developers can integrate them into the global encryption infrastructure.

This FAQ looks at how organizations, including the National Security Agency (NSA), Cybersecurity & Infrastructure Security Agency (CISA), Verisign domain name registry services, and cloud computing organizations, are reacting to and preparing for the deployment of PQC.

PQC algorithms are expected to be secure from cryptanalytic attacks by quantum computers. The NSA recently announced the Commercial National Security Algorithm Suite 2.0 (CNSA 2.0). It includes three elements, public keys, symmetric keys, and software and firmware updates (Figure 1). The signature use cases are the most critical, and the NSA is encouraging its vendors to begin adopting NIST signatures immediately. It’s anticipated to be a long process, and the NSA expects the transition to PQC algorithms for national security systems to be complete by 2033.

Figure 1. NSA’s CNSA 2.0 includes dedicated focuses on public keys, symmetric keys, and updating software and firmware (Image: National Security Agency).

PQC and critical infrastructure
CISA has its own PQC initiative to address the threats that will result from the deployment of quantum computing and has identified the transition to post-quantum encryption as a priority. CISA requires that government and critical infrastructure organizations make coordinated preparations to implement the NIST PQC standards scheduled for publication in 2024.

CISA, together with the Department of Homeland Security, has developed a Post-Quantum Cryptography Roadmap. The first step in preparation is the identification and inventory of vulnerable critical infrastructure systems across the 55 National Critical Functions (NCFs). NCFs are defined as functions of government and private industry so vital that their disruption, corruption, or dysfunction would have a debilitating effect on security, the economy, and/or public health or safety. Each individual NCF has already been analyzed, and specific security risks from quantum computing have been identified.

Verisign’s DNSSEC
Verisign has begun analyzing how to apply the NIST PQC algorithms to Domain Name System Security Extensions (DNSSEC). Verisign has indicated two potential concerns related to the size of the NIST PQC algorithms (Figure 2):

  • The NIST PQC algorithms have signature sizes that are up to two orders of magnitude larger than existing signatures and would result in DNSSEC responses that exceed the size limitations of existing systems. The Transmission Control Protocol and other mechanisms could handle the larger signatures but require additional overhead that would slow responses and are undesirable for use with every signature.
  • The large signatures require significantly more memory capacity. That creates challenges for resolvers using in-memory caches and authoritative nameservers using in-memory databases.
Figure 2. Size impact of FALCON and SPHINCS+ PQC algorithms (Image: Verisgn).

PQC in the cloud
Cloud security posture management (CSPM) is an automated set of security protocols. CSPM is designed to identify and correct cloud misconfiguration and for compliance monitoring to identify potential security gaps. CSPM tools examine cloud environments and compare them to best practices and known security risks. That can also involve enforcing encryption levels of information at rest or in transit, including encryption keys and event logging and tracing. Various suppliers of CSPM software and services are analyzing the impact of the NIST PQC algorithms to determine how or if they can be integrated into existing compliance monitoring solutions.

Summary
Now that NIST has identified the first group of PQC algorithms, a range of government and industry organizations are analyzing them to determine their impact on existing security protocols and processes. In most cases, analysis and potential integration of PQC algorithms is a high-priority activity.

References
Improve Post-Quantum Cryptography Security with CSPM, Trend Micro
Next Steps in Preparing for Post-Quantum DNSSEC – Verisign
Post-Quantum Cybersecurity Resources, National Security Agency/Central Security Service
Post-Quantum Cryptography Initiative, Cybersecurity & Infrastructure Security Agency

You may also like:


  • Post-quantum crypto standardization — background

  • What’s a quantum processing unit?

  • What are the five types of quantum computers?

  • What’s quantum control and how is it used?

  • What’s a quantum sensor?

Filed Under: Computer, FAQ, Featured Tagged With: FAQ

Primary Sidebar

Featured Contributions

Five challenges for developing next-generation ADAS and autonomous vehicles

Securing IoT devices against quantum computing risks

RISC-V implementation strategies for certification of safety-critical systems

What’s new with Matter: how Matter 1.4 is reshaping interoperability and energy management

Edge AI: Revolutionizing real-time data processing and automation

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy