New Encryption Standards Protect Against Post-Quantum Attacks
NIST is standardizing quantum-proof encryption algorithms to help federal agencies protect against quantum-based attacks.

The National Institute of Standards and Technology (NIST) is in the final stages of standardizing quantum-proof encryption algorithms, which federal agencies will be required to adopt to protect against quantum-based cyberattacks.
โWeโre still writing the standards. Theyโll probably come out in about a year,โ Dustin Moody, mathematician in the NIST Computer Security Division, told GovCIO Media & Research in an interview. โBut we very much encourage people to be planning ahead, knowing that these algorithms or these standards are coming out, and to prepare as much as possible for this transition.โ
Over the past six years, NIST ran a worldwide competition soliciting teams to design the strongest encryption algorithms possible. After several years of analysis and evaluation, NIST picked four algorithms from which to develop post-quantum cryptography data security standards. As soon as the standards are published, federal agencies will encrypt their data using post-quantum cryptography.
A quantum computer, which could revolutionize industries such as finance and health care, could also break current encryption standards and expose vast swaths of sensitive data ranging from patient privacy to national security. A quantum computer does not exist yet, but federal agencies could already be at risk from future quantum attacks. Adversaries are holding onto encrypted data that has no shelf life and is ready to be decrypted once they have access to a quantum computer.
โThe National Security Agency is well aware of the quantum threat,โ Moody said. โThis isnโt catching them by surprise, but at the same time, itโs going to take a long time to migrate to quantum-resistant solutions, and so they have to start a lot sooner than anyone else.โ
The White House recently signed the Quantum Computing Preparedness Act into law, requiring federal agencies to inventory all technology systems vulnerable to quantum cyber threats. The Office of Management and Budget (OMB) will develop guidance on executive agenciesโ transition to quantum-resistant cryptography.
The NIST National Cybersecurity Center of Excellence is also running a project called Migration to Post-Quantum Cryptography. It will partner with agencies such as the Department of Homeland Security and industry partners to develop guidance, reports and tools that organizations and companies can use to help them do their inventory and migrate from the current set of public-key cryptographic algorithms to quantum-resistant algorithms.
โThese are the steps that you need to be thinking about and how you can prepare now, even though we donโt have the standards published quite yet,โ Moody said.
Meanwhile, DARPA Program Manager Joe Altepeter is working on two initiatives called called โQuantum Benchmarkingโ and โUnderexplored Systems for Utility-Scale Quantum Computing.โ The primary goal of both programs is to reduce surprise and uncertainty around quantum technology.
โI canโt think of a bigger source for possible surprise than a technology where we are pretty sure that how good itโs going to be is going to fall somewhere between totally transformative and amazing and useless. Itโs somewhere in that range, between most important and nothing,โ Altepeter told GovCIO Media & Research in a CyberCast interview last year.
The Quantum Benchmarking program is focused on creating benchmarks to quantitatively measure progress toward transformational computational challenges. The Underexplored Systems for Utility-Scale Quantum Computing program will determine if there is a path to a quantum computer capable of achieving utility-scale operation faster than predicted.
โWe are hoping that companies, organizations will engage with us who think they really know how to build a big useful quantum computer, and we want to give them an opportunity to prove it and work with them in a sort of rigorous collaborative verification validation plan to make sure we understand โis there a surprising path to get one of these machines thatโs faster than people think?'โ Altepeter said.
Improving the error rate is one of the many breakthroughs needed before a working large-scale quantum computer is possible, Moody added.
โWeโre just kind of starting to get to that point where we can see practical use cases. With regards to how big they need to be until they threaten cryptography, weโre still a ways off from that right now,โ he said. โNone of the quantum computers that are being built come anywhere close to threatening current security levels. But itโs estimated that that could change within a decade or 15 years, that progress could happen that would threaten the cryptosystems that we have today.โ
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
Inside Oak Ridge National Labโs Pioneer Approach to AI
Energy Departmentโs Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NISTโs Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch -
Trump Overhauls Federal Cybersecurity with New Executive Order
The new directive aims to strengthen digital defenses while rolling back "burdensome" software requirements and refocusing AI security.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
DHS Secretary Urges Congress to Reauthorize CISA 2015
Federal leaders highlight CISA 2015's role in strengthening public-private partnerships and defending against evolving cyber threats.
3m read -
Rep. Gerry Connolly Leaves Lasting Mark on Federal Tech
Connolly's leadership in Congress significantly advanced government IT, emphasizing accountability, efficiency and a robust cybersecurity posture.
4m read -
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read