Workflow
信安世纪20250923
InfosecInfosec(SH:688201)2025-09-24 09:35

Summary of Quantum Computing and Post-Quantum Cryptography Conference Call Industry Overview - The conference call discusses the implications of quantum computing on traditional cryptographic systems, emphasizing the need for a transition to post-quantum cryptography to ensure data security. [2][11] Key Points and Arguments 1. Threat of Quantum Computing: Quantum computing poses a significant threat to traditional cryptographic systems, necessitating a migration to post-quantum algorithms at least five years ahead of quantum computer commercialization to prevent data breaches. [2][3] 2. U.S. Plans for Cryptography: The U.S. plans to ban traditional asymmetric encryption algorithms by 2030 and fully eliminate quantum-vulnerable algorithms by 2035, with key milestones set for 2028. [4][9] 3. Post-Quantum Algorithm Selection: The U.S. National Institute of Standards and Technology (NIST) will select three post-quantum algorithms in 2024, which will become FIPS standards (203, 204, 205). [4][5] 4. China's Initiatives: China is also advancing its post-quantum cryptography efforts, with a global call for algorithms initiated in 2025, aiming for completion and standardization by 2027. [6][17] 5. Performance Comparison: Current post-quantum algorithms show a performance gap of approximately 10 times compared to SM2, but can be twice as fast as RSA2048, indicating commercial potential. [2][7] 6. Agile Migration Plans: The migration to post-quantum algorithms requires agile migration plans that consider existing user tokens and systems, as complete replacement of traditional algorithms is not feasible. [8][9] 7. Industry Adoption: Financial and energy sectors are leading the migration efforts, with several banks already conducting assessments and planning for post-quantum transitions. [7][15] 8. Hardware vs. Software Migration: Current hardware upgrades are premature due to the lack of established standards for post-quantum algorithms, making software migration a priority. [12][13] 9. User Preparedness: Users have begun developing agile migration plans to ensure readiness for the upcoming standards, with expectations for rapid adaptation once standards are finalized. [14][18] Additional Important Content - Urgency in Adoption: There is a heightened urgency among industries, particularly in finance and telecommunications, to replace traditional cryptographic methods due to the imminent threats posed by quantum computing. [15][16] - Standardization Timeline: The domestic standardization process for post-quantum algorithms is expected to be more efficient than previous efforts, with a projected completion within three years. [17]