The first set of standards for post-quantum cryptography have been published — here's what it means for you

Quantum Chip
(Image credit: Shutterstock) (Image credit: Shutterstock)

The National Institute of Standards and Technology (NIST) has released its first three encryption standards designed to withstand decryption efforts from a quantum computer.

Quantum computers will provide computing power millions of times faster than current supercomputers, with the ability to crack current encryption standards equally as fast.

As a result of this, cybercriminals are already attacking organizations and stealing their encrypted data with the intention of decrypting it when they are able to get their hands on a quantum computer. This day is known among the security community as Q-Day.

Defending against Q-Day 

Our current encryption standards are used to protect almost everything we do across the internet, but they are not enough to defend against quantum computers, which is why new encryption algorithms capable of withstanding an attack from a quantum computer are currently being developed to protect both against theft now, and cracking in the future.

Quantum computers are especially good at factoring, which can be used to crack encryption methods quickly. Experts predict that the first quantum computers could emerge within 10 years, but at this time they will likely only be operational for research and development purposes in the hands of their manufacturers, with it being several more years before commercially available quantum computers appear on the market.

NIST has been working to produce these three encryption standards for eight years, drawing the best and the brightest of the encryption community to its cause. 

“The advancement of quantum computing plays an essential role in reaffirming America’s status as a global technological powerhouse and driving the future of our economic security," commented US Deputy Secretary of Commerce, Don Graves.

“Commerce bureaus are doing their part to ensure U.S. competitiveness in quantum, including the National Institute of Standards and Technology, which is at the forefront of this whole-of-government effort. NIST is providing invaluable expertise to develop innovative solutions to our quantum challenges, including security measures like post-quantum cryptography that organizations can start to implement to secure our post-quantum future.”

“As this decade-long endeavor continues, we look forward to continuing Commerce’s legacy of leadership in this vital space,” Graves concluded.

Included in the encryption standards are the algorithms’ computer code, implementation instructions, and the intended uses for each form of encryption. The first, named Federal Information Processing Standard (FIPS) 203 is a general encryption standard based on the CRYSTALS-Kyber algorithm, renamed to Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM).

The second, FIPS 204, is designed to protect digital signatures by using the CRYSTALS-Dilithium algorithm - renamed Module-Lattice-Based Digital Signature Algorithm (ML-DSA). The last encryption standard, FIPS 205, is also designed for digital signatures, but utilizes a different standard to ML-DSA in case vulnerabilities are discovered in FIPS 204. FIPS 205 uses the Sphincs+ algorithm, renamed to Stateless Hash-Based Digital Signature Algorithm (SLH-DSA).

More from TechRadar Pro

Benedict Collins
Staff Writer (Security)

Benedict has been writing about security issues for over 7 years, first focusing on geopolitics and international relations while at the University of Buckingham. During this time he studied BA Politics with Journalism, for which he received a second-class honours (upper division), then continuing his studies at a postgraduate level, achieving a distinction in MA Security, Intelligence and Diplomacy. Upon joining TechRadar Pro as a Staff Writer, Benedict transitioned his focus towards cybersecurity, exploring state-sponsored threat actors, malware, social engineering, and national security. Benedict is also an expert on B2B security products, including firewalls, antivirus, endpoint security, and password management.

Read more
ExpressVPN Lightway Protocol
ExpressVPN upgrades to post-quantum encryption NIST standards
The logo of Google Cloud
Google Cloud introduces quantum-safe digital signatures
AdGuard VPN during TechRadar tests
AdGuard becomes the latest VPN to add post-quantum encryption
Optical system for data encryption
Is it quantum-resistant? Researchers create 'uncrackable' encryption system by pairing AI and holograms produced by laser
A wall of data on a large screen.
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon
Security padlock in circuit board, digital encryption concept
5 cybersecurity predictions to look out for in 2025
Latest in Pro
Finger Presses Orange Button Domain Name Registration on Black Keyboard Background. Closeup View
I visited the world’s first registered .com domain – and you won’t believe what it’s offering today
Racks of servers inside a data center.
Modernizing data centers: an efficient path forward
Dr. Peter Zhou, President of Huawei Data Storage Product Line
Why AI commonization is so important for business intelligent transformation and what Huawei’s data storage has to offer
Wix automation
The world's leading website builder aims to save businesses time with new tool
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over