The PQC Migration Handbook
Commissioned by the AIVD, TNO has compiled a handbook together with CWI. This handbook offers organisations advice and concrete steps to mitigate the risk of quantum computers to cryptography.
PQC Migration handbook
Experts consider the chance small but real that by 2030 quantum computers will already be powerful enough to break current cryptographic standards. Moreover, malicious parties can already intercept and store encrypted data now in order to decrypt it later, when quantum computing is available. Therefore, it is important that organisations start moving to a quantum secure environment soon.
A first step in this migration is to carry out a PQC diagnostic, which includes an inventory of all cryptographic techniques, the data they protect and those who manage them. This inventory can be used to accurately assess the urgency of migrating to post-quantum cryptography (PQC). The manual then provides guidelines for choosing an appropriate PQC implementation strategy and instructions for migrating different cryptographic protocols.
Given the quantum threat and the many developments in cryptography, it is important to keep systems cryptographically agile so that protocols can be easily adapted or replaced when new vulnerabilities are discovered.
Thomas AttemaFunctie:Researcher Cryptology
In a data-driven society, it is essential to protect private and confidential information. At the same time the cryptography developed to protect information might, in the near future, be broken by quantum computers. Thomas studies novel cryptographic techniques, secure against quantum computers and capable of harnessing data in a privacy-friendly manner.
Looking for an expert?View all experts
Earlier detection of hypersonic missiles with TNO technology means more time for interception
TNO is active in all phases, ranging from novel interceptors and new concepts for Integrated Air and Missile Defense to advanced sensor solutions. Novel sensor technology is necessary as a successful kill-chain will push current radar systems to its limits.
First overview of cyberattack techniques by AI against AI
All international trend reports view Artificial Intelligence as the most important disruptive technology of the coming years. Where a new technology develops, new vulnerabilities also arise. And AI is no exception.
Norwegian-Dutch nanosatellites successfully launched
Two Norwegian-Dutch nanosatellites were successfully launched today. “Birkeland” and “Huygens” were placed in orbit around the earth by the company SpaceX.
MilSpace2: Spectrum monitoring dual satellite system
The MilSpace2 satellite system will demonstrate the military use of a microsatellite spectrum monitoring system.
Quantum computer is a threat to data protection
Quantum technology offers opportunities for societal. At the same time, it is a threat to our cyber security.