US selects four encryption algorithms to protect against future quantum attacks

Hands working on laptops touching diagram of chain and encrypted blocks
(Image credit: Shutterstock)

The US government has chosen four new encryption algorithms that should be able to protect secret digital communications from being decrypted by immensely powerful quantum computers.

There is fear in the wider cybersecurity community that the current encryption standards, protecting much of today’s digital communications across both private and public sector endpoints, will be rendered useless once quantum computers take off.

The four encryption algorithms will become part of the National Institute of Standards and Technology's (NIST) post-quantum cryptographic standard, the organization said in its announcement, adding that the standard should be finalized in “about two years”.

Post-quantum cryptography

“Today’s announcement is an important milestone in securing our sensitive data against the possibility of future cyberattacks from quantum computers,” said Secretary of Commerce Gina M. Raimondo.

“Thanks to NIST’s expertise and commitment to cutting-edge technology, we are able to take the necessary steps to secure electronic information so US businesses can continue innovating while maintaining the trust and confidence of their customers.”

NIST first started working on its post-quantum encryption solution in 2016. By choosing these four, the organization has reached “the finale of [its] post-quantum cryptography standardization project”.

“Our post-quantum cryptography program has leveraged the top minds in cryptography — worldwide — to produce this first group of quantum-resistant algorithms that will lead to a standard and significantly increase the security of our digital information,” said Under Secretary of Commerce for Standards and Technology and NIST Director Laurie E. Locascio.

NIST isn’t stopping at four, either. And additional few are under consideration, the organization said, adding that it plans to announce the finalists from the second round sometime in the future.

Explaining the need for multiple standards and a multi-stage approach, NIST said that a useful standard offers solutions designed for different situations, uses varied approaches for encryption, and offers more than one algorithm for each use case.

“Our post-quantum cryptography program has leveraged the top minds in cryptography — worldwide — to produce this first group of quantum-resistant algorithms that will lead to a standard and significantly increase the security of our digital information,” added NIST Director Laurie E. Locascio.

The algorithms are designed for two main tasks: general encryption, and identity authentication. For the former, NIST selected the CRYSTALS-Kyber algorithm, which operates relatively small encryption keys, and moves relatively fast. The remaining three algorithms are dedicated to digital signatures, and those include CRYSTALS-Dilithium, FALCON and SPHINCS+.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
ExpressVPN Lightway Protocol
ExpressVPN upgrades to post-quantum encryption NIST standards
AdGuard VPN during TechRadar tests
AdGuard becomes the latest VPN to add post-quantum encryption
The logo of Google Cloud
Google Cloud introduces quantum-safe digital signatures
Optical system for data encryption
Is it quantum-resistant? Researchers create 'uncrackable' encryption system by pairing AI and holograms produced by laser
Security padlock in circuit board, digital encryption concept
5 cybersecurity predictions to look out for in 2025
A woman holding a mobile phone in front of the Signal logo displayed on a computer screen
Salt Typhoon: US cybersecurity watchdog urges switch to Signal-like messaging apps
Latest in Security
A graphic showing someone on a tablet working through a supply chain.
Security issue in open source software leaves businesses concerned for systems
ransomware avast
One of the most powerful ransomware hacks around has been cracked using some serious GPU power
person at a computer
Infamous ransomware hackers reveal new tool to brute-force VPNs
person at a computer
Many workers are overconfident at spotting phishing attacks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Data Breach
Thousands of healthcare records exposed online, including private patient information
Latest in News
Pebble smartwatch countdown
Pebble confirms its smartwatch announcement is just hours away
Logo of YouTube Shorts
Is YouTube auto-playing Shorts when you open the app? Well, you’re not alone - here’s how to fix it
Google DeepMind panel discussion
“More sovereignty and protection” - Google goes all-in on UK AI with data residency, upskilling projects, and startup investments
Nintendo Switch 2
Nintendo Switch 2 expected to have AI upscaling and I can't wait to finally play Tears of the Kingdom with upgraded graphics
PowerColor Red Devil AMD RX 9070 XT graphics card shown side-on
Your next GPU could be from AMD, not Nvidia, if Team Red’s success with PC gamers continues
Intel Lunar Lake concept
Intel's Panther Lake processors won't arrive until Q1 2026 - corroborates previous delay rumors despite former Intel CEO's promise of 2025 launch