Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Report: 71% of tech leaders won’t hire devs without AI skills

      July 17, 2025

      Slack’s AI search now works across an organization’s entire knowledge base

      July 17, 2025

      In-House vs Outsourcing for React.js Development: Understand What Is Best for Your Enterprise

      July 17, 2025

      Tiny Screens, Big Impact: The Forgotten Art Of Developing Web Apps For Feature Phones

      July 16, 2025

      Too many open browser tabs? This is still my favorite solution – and has been for years

      July 17, 2025

      This new browser won’t monetize your every move – how to try it

      July 17, 2025

      Pokémon has partnered with one of the biggest PC gaming brands again, and you can actually buy these accessories — but do you even want to?

      July 17, 2025

      AMD’s budget Ryzen AI 5 330 processor will introduce a wave of ultra-affordable Copilot+ PCs with its mobile 50 TOPS NPU

      July 17, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 18, 2025
      Recent

      The details of TC39’s last meeting

      July 18, 2025

      Reclaim Space: Delete Docker Orphan Layers

      July 18, 2025

      Notes Android App Using SQLite

      July 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      KeySmith – SSH key management

      July 17, 2025
      Recent

      KeySmith – SSH key management

      July 17, 2025

      Pokémon has partnered with one of the biggest PC gaming brands again, and you can actually buy these accessories — but do you even want to?

      July 17, 2025

      AMD’s budget Ryzen AI 5 330 processor will introduce a wave of ultra-affordable Copilot+ PCs with its mobile 50 TOPS NPU

      July 17, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Post-Quantum Cryptography Migration Should Start Now: Coalition

    Post-Quantum Cryptography Migration Should Start Now: Coalition

    May 29, 2025

    post-quantum cryptography migration roadmap

    As estimates of the quantum computing power needed to crack current public key encryption algorithms continue to drop, a group of technology companies and organizations is urging users to begin migrating toward post-quantum cryptographic standards now.

    To help organizations with the transition to post-quantum cryptography, the Post-Quantum Cryptography Coalition (PQCC) released a migration roadmap today to guide companies through the phases of that journey.

    “As quantum computing technology continues to advance, organizations cannot afford to delay preparing for these transformative changes and threats to their security,” Wen Masters, MITRE’s vice president of cyber technologies, said in a statement.

    MITRE is one of the founding members of PQCC, along with SandboxAQ, PQShield, IBM Quantum and Microsoft.

    The roadmap’s release comes just days after the publication of a paper that reduced by more than 95% the estimated quantum computing power needed to crack RSA-2048 encryption keys.

    Quantum Computing Power Needed to Crack RSA-2048 Lowered

    That paper, by Craig Gidney of Google Quantum AI, updates a 2019 paper Gidney co-authored that estimated that 2048-bit RSA integers could be broken in eight hours by a quantum computer with 20 million noisy qubits.

    “In this paper, I substantially reduce the number of qubits required,” Gidney wrote in the new paper published on arXiv. “I estimate that a 2048 bit RSA integer could be factored in less than a week by a quantum computer with less than a million noisy qubits.”

    In a blog post on the paper, Gidney said that current quantum computers with relevant error rates “have on the order of only 100 to 1000 qubits,” and the National Institute of Standards and Technology (NIST) is leading efforts to develop post-quantum cryptographic algorithms “that are expected to be resistant to future large-scale quantum computers. However, this new result does underscore the importance of migrating to these standards in line with NIST recommended timelines.”

    In a November 2024 report, NIST said that “even if quantum computers are a decade away, organizations must begin the migration to postquantum cryptography today to avoid having their encrypted data exposed once quantum computers become operational in the future.”

    While certain applications may require post-quantum cryptography (PQC) sooner, NIST and U.S. federal systems have set an “overall goal of achieving widespread PQC adoption by 2035.”

    In an April update, PQCC noted that only three PQC standards have seen “some adoption” so far: SSH, TLS 1.3, and IKE/IPSec. Here is PQCC’s standards adoption heatmap:

    Post-quantum cryptography standards development and adoption
    Post-quantum cryptography standards development and adoption (PQCC)

    Post-Quantum Cryptography Migration Roadmap

    The 20-page PQCC migration roadmap details four migration phases to help CIOs and CISOs “act decisively, taking proactive steps to protect sensitive data now and in the future.”

    Those migration phases are:

    • Preparation: Starting with an overview of an organization’s PQC migration aims, assigning a migration lead, identifying stakeholders, “and aligning stakeholders through strategic messaging.”
    • Baseline Understanding: Gathering a baseline understanding of an organization’s data inventory, prioritizing assets to be updated, and establishing required resources and available budget.
    • Planning and Execution: Collaborating with system vendors and internal system owners “to ensure that post-quantum solutions are acquired externally or developed internally and implemented effectively.”
    • Monitoring and Evaluation: Developing measures for tracking migration process and formulating a process “for reassessing cryptographic security as quantum capabilities evolve.”

    “The process outlined in this roadmap underscores the importance of strategic planning, stakeholder alignment, and continuous monitoring and documentation to adapt to technological advancements and maintain robust security postures,” the migration document concludes. “As the quantum computing landscape continues to evolve, organizations must remain adaptable, tracking updates in guidance to maintain a secure PQC transition.”

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSmashing Security podcast #419: Star Wars, the CIA, and a WhatsApp malware mirage
    Next Article Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    July 18, 2025
    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    July 18, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-27031 – Cisco Router IOCTL Memory Corruption

    Common Vulnerabilities and Exposures (CVEs)

    AWS Introduces SWE-PolyBench: A New Open-Source Multilingual Benchmark for Evaluating AI Coding Agents

    Machine Learning

    CVE-2025-3893 – MegaBIP SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    resticprofile is a configuration profiles manager and scheduler

    Linux

    Highlights

    CVE-2025-46571 – Open WebUI Unauthenticated JavaScript File Upload to Admin RCE

    May 5, 2025

    CVE ID : CVE-2025-46571

    Published : May 5, 2025, 7:15 p.m. | 18 minutes ago

    Description : Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.6.6, low privileged users can upload HTML files which contain JavaScript code via the `/api/v1/files/` backend endpoint. This endpoint returns a file id, which can be used to open the file in the browser and trigger the JavaScript code in the user’s browser. Under the default settings, files uploaded by low-privileged users can only be viewed by admins or themselves, limiting the impact of this vulnerability. A link to such a file can be sent to an admin, and if clicked, will give the low-privileged user complete control over the admin’s account, ultimately enabling RCE via functions. Version 0.6.6 contains a fix for the issue.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Vite 7.0 Is Out

    June 24, 2025

    CVE-2025-5445 – Linksys Wireless Router OS Command Injection Vulnerability

    June 2, 2025

    CVE-2025-46227 – Brecht Custom Related Posts Cross-site Scripting (XSS)

    April 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.