{"id":15286,"date":"2024-08-15T07:52:43","date_gmt":"2024-08-15T10:52:43","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=15286"},"modified":"2024-08-15T07:53:59","modified_gmt":"2024-08-15T10:53:59","slug":"no-hay-tiempo-que-perder-el-nist-emite-formalmente-estandares-para-la-defensa-contra-la-pirateria-cuantica","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=15286","title":{"rendered":"&#8216;No hay tiempo que perder&#8217;: el NIST emite formalmente est\u00e1ndares para la defensa contra la pirater\u00eda cu\u00e1ntica"},"content":{"rendered":"<p>El Instituto Nacional de Est\u00e1ndares y Tecnolog\u00eda (NITS, por sus siglas en ingl\u00e9s) de los EE.UU. public\u00f3 oficialmente las esperadas versiones finales de tres nuevos algoritmos de cifrado poscu\u00e1ntico , y se est\u00e1n preparando algoritmos adicionales m\u00e1s especializados. Todos ellos est\u00e1n dise\u00f1ados para defenderse de futuros ataques inform\u00e1ticos llevados a cabo por ordenadores cu\u00e1nticos, una amenaza no probada pero de r\u00e1pido desarrollo que podr\u00eda descifrar r\u00e1pidamente los tipos de cifrado que se utilizan casi universalmente en la actualidad, incluidos los que se utilizan en los sistemas m\u00e1s sensibles del Pent\u00e1gono.<\/p>\n<hr \/>\n<p>WASHINGTON \u2014 This morning the National Institute of Standards &amp; Technology officially\u00a0<a href=\"https:\/\/www.nist.gov\/news-events\/news\/2024\/08\/nist-releases-first-3-finalized-post-quantum-encryption-standards\" target=\"_blank\" rel=\"noopener\">released<\/a>\u00a0the long-awaited final versions of three new\u00a0<a href=\"https:\/\/breakingdefense.com\/2023\/12\/saving-schrodingers-cat-getting-serious-about-post-quantum-encryption-in-2024\/\" target=\"_blank\" rel=\"noopener\">post-quantum encryption<\/a>\u00a0algorithms, with additional, more specialized algorithms on the way. They\u2019re all designed to defend against future hacks carried out by quantum computers, an\u00a0<a href=\"https:\/\/breakingdefense.com\/2023\/12\/off-to-the-races-darpa-harvard-breakthrough-brings-quantum-computing-years-closer\/\" target=\"_blank\" rel=\"noopener\">unproven but rapidly developing threat<\/a>\u00a0that could quickly crack the kinds of encryption used almost universally today, including those used in the most sensitive Pentagon systems.<\/p>\n<p>While implementing the NIST standards is voluntary for most private companies (albeit strongly recommended), they\u2019re mandatory for national security agencies, including the entire Defense Department. The official deadline set by the White House is not until 2035. But because the vulnerable algorithms have been so widely used for so many years, and are so deeply embedded in often obscure chunks of code, it may well take that long to root them all out and replace them.<\/p>\n<p>\u201cThis is the starting gun for what may be the single largest overhaul of US government communication systems since the adoption of the Internet, as ordered by the President in\u00a0<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/05\/04\/national-security-memorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-to-vulnerable-cryptographic-systems\/\" target=\"_blank\" rel=\"noopener\">National Security Memorandum 10<\/a>,\u201d said RAND scientist\u00a0<a href=\"https:\/\/www.rand.org\/about\/people\/p\/parker_edward.html\" target=\"_blank\" rel=\"noopener\">Edward Parker<\/a>. \u201cIt will probably go on for decades and will cost billions of dollars: OMB estimated $7.1 billion over the next decade for civilian federal government agencies alone, not including national security systems. It will cost even more time and money from the private sector.\u201d<\/p>\n<p>\u201cThere\u2019s no time to waste,\u201d Parker told Breaking Defense. \u201cAny organization that handles sensitive data should get moving on migrating to PQC [post-quantum cryptography] as soon as possible.\u201d<\/p>\n<p><a href=\"https:\/\/billingtoncybersummit.com\/speaker\/duncan-jones\" target=\"_blank\" rel=\"noopener\">Duncan Jones<\/a>, the head of quantum cybersecurity at vendor\u00a0<a href=\"https:\/\/www.quantinuum.com\/about\" target=\"_blank\" rel=\"noopener\">Quantinuum<\/a>, put it even more bluntly: \u201cThe release of the standards is a wake-up call to any organization that has been dragging its heels on quantum.\u201d<\/p>\n<p>In fact, many federal agencies and private companies have been at work for months or years. They haven\u2019t been implementing the actual algorithms, which were only formally finalized today after years of extensive testing that saw many promising candidates discarded along the way as NIST,\u00a0<a href=\"https:\/\/www.nsa.gov\/Press-Room\/Press-Releases-Statements\/Press-Release-View\/Article\/3498776\/post-quantum-cryptography-cisa-nist-and-nsa-recommend-how-to-prepare-now\/\" target=\"_blank\" rel=\"noopener\">NSA<\/a>, or independent researchers found hidden weak points. Instead, they\u2019ve been laying the groundwork by taking inventory of their existing systems,\u00a0<a href=\"https:\/\/breakingdefense.com\/2023\/09\/all-systems-need-to-be-hardened-officials-industry-sound-the-alarm-on-quantum-threat-to-encryption\/\" target=\"_blank\" rel=\"noopener\">hunting through deeply buried subroutines<\/a>\u00a0to find all the instances of oldschool encryption they\u2019ll have to replace.<\/p>\n<p>So, on the bright side, the three NIST standards formally released today \u2014 and a fourth expected to release by New Year\u2019s \u2014 are familiar to cybersecurity professionals and thoroughly tested after almost a decade of often highly publicized development. On the dark side, though, there are plenty of nasty surprises lurking in networks, internet-of-things devices, and possibly even weapons systems, all of which will take time and technical talent to fix.<\/p>\n<p>\u201cI\u2019m sure that organizations will discover plenty of practical surprises as they migrate their systems over to PQC \u2014 for example, discovering that certain devices have traditional cryptography algorithms unexpectedly hard-coded in,\u201d Parker said. \u201cBut these issues should all be fixable. I don\u2019t think there are any true deal-breakers lurking out there.\u201d<\/p>\n<p>Of course, \u201cfixable\u201d does not mean \u201ceasily\u201d or \u201ccheaply.\u201d<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/breakingdefense.com\/2024\/08\/no-time-to-waste-nist-formally-issues-standards-for-defense-against-quantum-hacking\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/breakingdefense.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Instituto Nacional de Est\u00e1ndares y Tecnolog\u00eda (NITS, por sus siglas en ingl\u00e9s) de los EE.UU. public\u00f3 oficialmente las esperadas versiones finales de tres nuevos&hellip; <\/p>\n","protected":false},"author":1,"featured_media":15287,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/15286"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15286"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/15286\/revisions"}],"predecessor-version":[{"id":15288,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/15286\/revisions\/15288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/15287"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}