{"id":24986,"date":"2022-07-07T07:30:45","date_gmt":"2022-07-07T11:30:45","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=24986"},"modified":"2022-07-08T12:48:02","modified_gmt":"2022-07-08T16:48:02","slug":"nist-selects-four-encryption-algorithms-to-counter-future-attacks-on-quantum-computers","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/nist-selects-four-encryption-algorithms-to-counter-future-attacks-on-quantum-computers\/","title":{"rendered":"NIST Selects Four Encryption Algorithms To Counter Future Attacks On Quantum Computers"},"content":{"rendered":"<p id=\"arIndex_1\" data-ar-index=\"0\">The Department of Commerce&#8217;s National Institute of Standards and Technology (NIST) has selected four encryption algorithms to withstand future quantum computer attacks.<\/p>\n<p id=\"arIndex_2\" data-ar-index=\"1\">The four encryption algorithms include CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON and SPHINCS+. The four algorithms were created by experts from several countries and institutions.<\/p>\n<p id=\"arIndex_3\" data-ar-index=\"2\">The algorithms are designed with two main objectives associated with encryption use. This include general encryption and digital signatories. General encryption is used to protect information exchanged over a public network, while digital signatures are used for identity authentication.<\/p>\n<p id=\"arIndex_4\" data-ar-index=\"3\">NIST divided the algorithms into the two targets and selected CRYSTALS-Kyber algorithm under general encryption and the other three CRYSTALS-Dilithium, FALCON and SPHINCS + under digital signatories.<\/p>\n<p id=\"arIndex_5\" data-ar-index=\"4\">General encryption is used when secure websites are accessed. Among the advantages CRYSTALS-Kyber offers in this respect are small encryption keys that can be easily exchanged between two parties, and the speed of operation.<\/p>\n<p id=\"arIndex_6\" data-ar-index=\"5\">The sources for this piece include an article in <a href=\"https:\/\/www.techrepublic.com\/article\/nist-encryption-algorithms\/\" target=\"_blank\" rel=\"noopener\">TechRepublic<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Department of Commerce&#8217;s National Institute of Standards and Technology (NIST) has selected four encryption algorithms to withstand future quantum computer attacks. The four encryption algorithms include CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON and SPHINCS+. The four algorithms were created by experts from several countries and institutions. The algorithms are designed with two main objectives associated with encryption [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34,349,378,361,16],"tags":[525,443,573,275],"class_list":["post-24986","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence","category-development","category-digital-transformation","category-privacy","category-security","tag-ai","tag-cyber-security","tag-quantum-computing","tag-top-story"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/24986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=24986"}],"version-history":[{"count":3,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/24986\/revisions"}],"predecessor-version":[{"id":25087,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/24986\/revisions\/25087"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=24986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=24986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=24986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}