IT Examiner School eBook May 2025
Post Quantum Cryptography (PQC)
• Overview • Risks • FI Preparedness
FI Preparedness Steps
• Inventory sensitive and critical datasets that must be secured for extended amount of time. • Conduct an inventory of all systems using cryptographic technologies • Identify acquisition, cybersecurity, and data security standards requiring updates to reflect post-quantum requirements • From the inventory, identify where and for what purpose public key cryptography is being used and mark as "quantum vulnerable" • Determine prioritizations of system for cryptographic transition • Using inventory and prioritization information, develop plan for systems transitions to quantum resistant cryptographic standard (e.g., Lattice-based, Stateless Hash-based)
Made with FlippingBook - Online magazine maker