{"id":1126000,"date":"2024-06-13T16:37:05","date_gmt":"2024-06-13T20:37:05","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/the-next-administration-must-be-ready-for-new-quantum-encryption-standards-mitre-advises-nextgov-fcw\/"},"modified":"2024-06-13T16:37:05","modified_gmt":"2024-06-13T20:37:05","slug":"the-next-administration-must-be-ready-for-new-quantum-encryption-standards-mitre-advises-nextgov-fcw","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/quantum-computing\/the-next-administration-must-be-ready-for-new-quantum-encryption-standards-mitre-advises-nextgov-fcw\/","title":{"rendered":"The next administration must be ready for new quantum encryption standards, MITRE advises &#8211; Nextgov\/FCW"},"content":{"rendered":"<p><p>    The next presidential administration  whether it be a second    term for current President Joe Biden or former President Donald    Trump  will have to focus on ensuring the U.S. is ready for    quantum computing to outperform the encryption methods    currently used to secure data, a top federally-backed research    group argues.  <\/p>\n<p>    MITRE said in an advisory document released last week that the    next presidential administration will need to prioritize such    quantum computing advances, as well as critical infrastructure    protections, clarification of cyber leadership roles and    implementation of a zero trust framework for the federal    government.  <\/p>\n<p>    The readout is part of a series of releases    from the federally affiliated national security research giant    ahead of the upcoming election and possible transition of power    in the White House. The release is the first of its kind in the    2024 election season that focuses on U.S. cybersecurity policy.  <\/p>\n<p>    Todays cryptographic systems rely on complex mathematical algorithms that are    difficult for traditional computers to unravel. But future    quantum computers could solve these problems much more    efficiently because they rely on the laws of     quantum mechanics and can process a vast number of    possibilities simultaneously. It means malicious actors in the    coming years may be augmented with new abilities to decode    encrypted information currently considered secure.  <\/p>\n<p>    Practical quantum computing tools are still in development,    though a top NSA official     predicted in April that they could be available in three to    five years and will likely be accessed in cloud based    environments.  <\/p>\n<p>    While it is hard to predict precisely when quantum computing    will crack the currentencryption, the U.S. government    must prepare now to protect data  past, present, and future     in the context of post-quantum cryptography, said the MITRE    advisory, referring to a new era of cryptographic algorithms    that are designed to be secure against the capabilities of    quantum computers. The National Institute of Standards and    Technology has been in the process of     developing tools to help agencies migrate to PQC standards,    as directed by the White House.  <\/p>\n<p>    The next administration should assess the U.S. governments    post-quantum readiness, craft a cryptographic bill of    materials to outline what systems need transitioning to PQC    and use expertise from the PQC Coalition, MITRE argues.  <\/p>\n<p>    The White House and intelligence partners have already been    working to bolster government network defenses against advanced    techniques enabled by the creation of practical quantum    computers in the near future. The NSA, in particular, has        set a 2035 deadline for IC systems to be locked into these    new PQC standards.  <\/p>\n<p>    Federal scientific thought leaders are trying to prevent        quantum-powered cyber incidents like record now, decrypt    later attacks where an adversary will hoover up encrypted data    streams, store them, and  with the eventual existence of a    powerful enough quantum device  decrypt that data to use for    theft or exploitation.          <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.nextgov.com\/cybersecurity\/2024\/06\/next-administration-must-be-ready-new-quantum-encryption-standards-mitre-advises\/397284\/\" title=\"The next administration must be ready for new quantum encryption standards, MITRE advises - Nextgov\/FCW\">The next administration must be ready for new quantum encryption standards, MITRE advises - Nextgov\/FCW<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The next presidential administration whether it be a second term for current President Joe Biden or former President Donald Trump will have to focus on ensuring the U.S.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/quantum-computing\/the-next-administration-must-be-ready-for-new-quantum-encryption-standards-mitre-advises-nextgov-fcw\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[257742],"tags":[],"class_list":["post-1126000","post","type-post","status-publish","format-standard","hentry","category-quantum-computing"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1126000"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1126000"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1126000\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1126000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1126000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1126000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}