
Sign up to save your podcasts
Or


The discussion in this podcast provides an extensive overview of the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) standardisation process, which was initiated to combat the existential threat posed by future quantum computers to current public-key algorithms like RSA and ECC. NIST’s multi-year effort, which began in 2016, culminated in the selection of a diverse portfolio of quantum-resistant algorithms—including the lattice-based ML-KEM and ML-DSA, the hash-based SLH-DSA, and the code-based HQC—to ensure cryptographic resilience. A primary driver for this urgent transition is the "harvest now, decrypt later" threat model, where adversaries steal encrypted data today to decrypt it later with a quantum computer. Consequently, NIST has established formal transition timelines, mandating that all organisations discontinue the use of vulnerable public-key algorithms after 2035, underscoring the immediate need for a methodical migration and the adoption of "crypto-agility."
By HelloInfoSecThe discussion in this podcast provides an extensive overview of the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) standardisation process, which was initiated to combat the existential threat posed by future quantum computers to current public-key algorithms like RSA and ECC. NIST’s multi-year effort, which began in 2016, culminated in the selection of a diverse portfolio of quantum-resistant algorithms—including the lattice-based ML-KEM and ML-DSA, the hash-based SLH-DSA, and the code-based HQC—to ensure cryptographic resilience. A primary driver for this urgent transition is the "harvest now, decrypt later" threat model, where adversaries steal encrypted data today to decrypt it later with a quantum computer. Consequently, NIST has established formal transition timelines, mandating that all organisations discontinue the use of vulnerable public-key algorithms after 2035, underscoring the immediate need for a methodical migration and the adoption of "crypto-agility."