IT Examiner School eBook May 2025

Post Quantum Cryptography (PQC)

• Overview • Risks • FI Preparedness

FI Preparedness Steps

• Inventory sensitive and critical datasets that must be secured for extended amount of time. • Conduct an inventory of all systems using cryptographic technologies • Identify acquisition, cybersecurity, and data security standards requiring updates to reflect post-quantum requirements • From the inventory, identify where and for what purpose public key cryptography is being used and mark as "quantum vulnerable" • Determine prioritizations of system for cryptographic transition • Using inventory and prioritization information, develop plan for systems transitions to quantum resistant cryptographic standard (e.g., Lattice-based, Stateless Hash-based)

Made with FlippingBook - Online magazine maker