In July 2022, NIST announced the first batch of to-be-standardized algorithms for post-quantum cryptography. This announcement has security professionals world-wide scrambling to assess the status of their systems and to evaluate the need for transitioning to these algorithms in the future. Security is critical to all systems, so this has led to some nervousness and uncertainty. Moreover, the discussions around the application of post-quantum cryptography are highly technical, which makes it challenging for security professionals to make a well-informed decision.
Unfortunately, this current situation of temporary uncertainty also creates a brief opening for opportunistic actors to push their “solutions” through tactics of fearmongering (warning against nonexistent problems which they claim to solve) and deception (claiming to solve real problems while in fact they do not). This can lead to well-intentioned but misguided investments, and worst-case even to vulnerable systems. In this white paper we want to address two important questions with the goal of helping embedded security architects and engineers weather the current uncertain stage of this evolution by arming them with the right information:
- Why should I (not) be concerned about using post-quantum cryptography?
- What is the status of Intrinsic ID hardware security products in a post-quantum world?
- The need for Post-Quantum Cryptography
- Impact on of Quantum Computing on
- Public-Key Cryptography
- Symmetric Cryptography
- Information-Theoretical Security
- Explanation of Intrinsic ID PUFs and PUF-based Key Generation
- Post-Quantum assessment of Intrinsic ID products QuiddiKey and Apollo
Please complete this form and we will send you our white paper Intrinsic ID PUFs in a Post-Quantum World. Fields with an asterisk (*) are required.