This cutting-edge initiative will enable early detection of cryptographic weaknesses across networks (such as defense, telecommunications, banking, devices, and applications) helping organizations transition proactively to Post-Quantum Cryptography (PQC).
About Automated Tool
- It will generate a detailed report highlighting quantum-vulnerable algorithms, their purpose, and their exact location within the device to support informed migration planning toward quantum-safe security.
- It will comprise of three core modules: Web Application (for network traffic, vulnerability assessment and quantum risks), Security Scanner Agent, and Control Software.
About Post-Quantum Cryptography (PQC)
- It is a set of cryptographic algorithms that are designed to resist attack by quantum computers, which will be much more powerful than classical computers.
- It aims to ensure confidential data remains secure even when extremely powerful quantum computers make current encryption methods obsolete.
- US’ National Institute of Standards and Technology (NIST) has finalized its initial set of post-quantum cryptographic standards.
What is Quantum Cryptography?
- It is a set of methods that uses the rules of quantum mechanics to securely encrypt, transmit, and decode information.
- It employs quantum devices, such as sensors capable of recording individual particles of light (photons), to protect data from an adversarial attack.
- Types:
- Quantum key distribution (QKD): It is a secure communication method for exchanging encryption keys only known between shared parties.
- Quantum coin-flipping: It is a type of cryptographic primitive (something of a building block for algorithms) that allows two parties who do not trust each other to agree on a set of parameters.