Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Tech Giants Form Post-Quantum Cryptography Alliance

The Linux Foundation, AWS, Cisco, IBM, and other tech companies establish the Post-Quantum Cryptography Alliance.

Quantum Computing

The Linux Foundation today announced the launch of the Post-Quantum Cryptography Alliance (PQCA), an initiative to advance and drive the adoption of post-quantum cryptography.

Founded by AWS, Cisco, IBM, IntellectEU, Nvidia, QuSecure, SandboxAQ, and the University of Waterloo, the PQCA will focus on addressing the security challenges posed by quantum computing.

With quantum computing expected to allow threat actors to break existing security keys fast, securing data and communications in the post-quantum era becomes imperative, and the PQCA is set to help address this issue.

The alliance will engage in the development of both standardized and post-quantum algorithms, aiming to help organizations and open source projects looking for libraries and packages to support their alignment with the Commercial National Security Algorithm Suite 2.0.

To facilitate the adoption of post-quantum cryptography, the PQCA will engage in various technical projects, including the development of software for evaluating, prototyping, and deploying post-quantum algorithms.

PQCA founding members have long been active in the standardization of post-quantum cryptography, co-authoring the first four algorithms selected in the NIST Post-Quantum Cryptography Standardization Project, and the work of PQCA builds on this foundation.

PQCA’s launch projects include the Open Quantum Safe project, which was founded at the University of Waterloo in 2014, and the new PQ Code Package project, aimed at the development of high-assurance production-ready software implementations of post-quantum cryptography standards. Both are listed on PQCA’s GitHub page.

“Quantum computing offers the potential to solve previously unapproachable problems while simultaneously threatening many digital protections we take for granted. Cryptography is foundational for securing data, users, devices, and services. The necessary conversion to post-quantum cryptography represents one of the largest and most complex technology migrations in the digital era,” Cisco director Jon Felten said.

Advertisement. Scroll to continue reading.

The launch of PQCA comes roughly one year after IBM published a roadmap to help federal agencies and businesses with the migration to post-quantum computing. Also last year, UK and US government agencies published guidance to help organizations with the transition.

Related: How Quantum Computing Will Impact Cybersecurity

Related: QuSecure Unveils Quantum-Resilient Communications Satellite Link

Related: AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithm

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem