{"id":92721,"date":"2019-06-26T19:22:55","date_gmt":"2019-06-27T02:22:55","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/06\/nist-reveals-26-algorithms-advancing-to-the-post-quantum-crypto-semifinals"},"modified":"2019-06-26T19:22:55","modified_gmt":"2019-06-27T02:22:55","slug":"nist-reveals-26-algorithms-advancing-to-the-post-quantum-crypto-semifinals","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/06\/nist-reveals-26-algorithms-advancing-to-the-post-quantum-crypto-semifinals","title":{"rendered":"NIST Reveals 26 Algorithms Advancing to the Post-Quantum Crypto \u2018Semifinals\u2019"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/nist-reveals-26-algorithms-advancing-to-the-post-quantum-crypto-semifinals2.jpg\"><\/a><\/p>\n<p>The field has narrowed in the race to protect sensitive electronic information from the threat of quantum computers, which one day could render many of our current encryption methods obsolete.<\/p>\n<p>As the latest step in its program to develop effective defenses, the National Institute of Standards and Technology (NIST) has winnowed the group of potential encryption tools\u2014known as cryptographic algorithms\u2014down to a <a href=\"https:\/\/csrc.nist.gov\/news\/2019\/pqc-standardization-process-2nd-round-candidates\">bracket of 26<\/a>. These algorithms are the ones NIST mathematicians and computer scientists consider to be the strongest candidates submitted to its <a href=\"https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/Post-Quantum-Cryptography-Standardization\">Post-Quantum Cryptography Standardization<\/a> project, whose goal is to create a set of standards for protecting electronic information from attack by the computers of both tomorrow and today.<\/p>\n<p>\u201cThese 26 algorithms are the ones we are considering for potential standardization, and for the next 12 months we are requesting that the cryptography community focus on analyzing their performance,\u201d said NIST mathematician Dustin Moody. \u201cWe want to get better data on how they will perform in the real world.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The field has narrowed in the race to protect sensitive electronic information from the threat of quantum computers, which one day could render many of our current encryption methods obsolete. As the latest step in its program to develop effective defenses, the National Institute of Standards and Technology (NIST) has winnowed the group of potential [\u2026]<\/p>\n","protected":false},"author":526,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523,1625,41,2229,1617],"tags":[],"class_list":["post-92721","post","type-post","status-publish","format-standard","hentry","category-computing","category-encryption","category-information-science","category-mathematics","category-quantum-physics"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/92721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/526"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=92721"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/92721\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=92721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=92721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=92721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}