{"id":54045,"date":"2025-01-08T10:10:32","date_gmt":"2025-01-08T10:10:32","guid":{"rendered":"https:\/\/www.innovationnewsnetwork.com\/?p=54045"},"modified":"2025-01-08T10:16:57","modified_gmt":"2025-01-08T10:16:57","slug":"cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats","status":"publish","type":"post","link":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/","title":{"rendered":"CISA: How post-quantum cryptography safeguards against quantum threats"},"content":{"rendered":"

Dr Garfield Jones, Associate Chief of Strategic Technology at the Cybersecurity and Infrastructure Security Agency<\/a> (CISA), discusses the vital importance of post-quantum cryptography as we enter the quantum era<\/a>.<\/h2>\n

The rise of quantum computing promises transformative advancements across industries, but it also introduces profound security challenges. At the heart of these concerns lies the vulnerability of our current cryptographic systems \u2013 frameworks that protect everything from personal data to critical infrastructure. As quantum technology advances, the encryption methods we rely on today could soon become obsolete, leaving sensitive information exposed to unprecedented risks.<\/p>\n

Enter post-quantum cryptography, the field dedicated to developing cryptographic algorithms capable of withstanding the computational power of future quantum machines. This emerging discipline is not just a technical necessity but a critical frontier in the fight to safeguard global security. Governments, industries, and researchers are racing against time to ensure our digital infrastructure is ready for a post-quantum world.<\/p>\n

In this interview, CISA\u2019s Dr Jones delves into the pivotal role of post-quantum cryptography in securing the digital landscape. From addressing vulnerabilities in public key infrastructure (PKI) to the efforts being led by global and national organisations, the conversation focuses on what it will take to protect our systems in an era defined by quantum innovation. As the quantum revolution accelerates, understanding and adopting these next-generation solutions is more crucial than ever.<\/p>\n

As quantum computing advances, what potential security issues does the technology pose?<\/h2>\n

This is a question we get quite frequently. The primary risk we\u2019re looking at is authentication. When we consider cryptographic vulnerabilities, the most significant threat is to authentication mechanisms. This includes business transactions, secure communications, digital signatures, and customer information.<\/p>\n

These areas are critical because authentication is central to identity verification and secure key transport, whether symmetric or asymmetric. Essentially, it threatens the entire PKI. A cryptographically relevant quantum computer (CRQC) could compromise all the secure communications we rely on today, breaking the encryption that underpins PKI.<\/p>\n

This isn\u2019t just about quantum computing as we know it today. It\u2019s specifically about CRQCs \u2013 error-correcting quantum computers capable of breaking PKI. Such systems would endanger sensitive information secured with PKI, including business transactions, communications, and long-term intelligence. An adversary with access to a CRQC could decrypt data collected now or in the future under the \u201charvest now, decrypt later\u201d approach. This makes the threat very real and urgent.<\/p>\n

Anything using cryptography, especially asymmetric cryptography, is at risk. Symmetric cryptography has a bit more time before being significantly threatened, but asymmetric cryptography faces an immediate issue with CRQCs. Fortunately, the National Institute of Standards and Technology (NIST) has released quantum-resistant standards to help mitigate or delay the problem.<\/p>\n

What are the primary goals of CISA\u2019s Post-Quantum Cryptography Initiative, and how do you see its impact on securing critical infrastructure?<\/h3>\n

The goals are multi-faceted but centre around analysis, testing, and standardisation of new cryptographic primitives. For instance, CISA is focused on guiding and supporting critical infrastructure sectors to mitigate risks in existing systems. Education is the first priority: ensuring that teams and organisations understand the threat and how to address it.<\/p>\n

Next, we evaluate the sensitivity of organisations\u2019 data and assets \u2013 identifying what\u2019s at risk and for how long. This includes inventorying IT and OT systems and working with vendors to implement and validate standards. It\u2019s not just about rolling out new standards but ensuring that vendors and third-party suppliers meet these standards accurately.<\/p>\n

Budgeting is another critical aspect. Organisations need to allocate resources for necessary hardware, software updates, or replacements to transition to post-quantum cryptography. This includes updating lifecycle plans for IT and OT systems and ensuring state, local, tribal, and territorial (SLTT) entities are part of the preparation process.<\/p>\n

Finally, we emphasise the cyclical nature of this work \u2013 monitoring and adapting as new standards emerge. NIST has already released 14 new standards under review, and as cryptographic needs evolve, so will the standards we must implement.<\/p>\n

It seems like two key challenges are ensuring no one is left behind in this transition and keeping up with the constantly changing landscape?<\/h3>\n

That\u2019s absolutely right. This isn\u2019t a \u201cdrop the mic and walk away\u201d situation. Cryptography is inherently mathematical, and over time, even classical algorithms are broken. The same will apply to quantum algorithms as CRQCs grow more capable. This is why crypto agility \u2013 our ability to adapt to new and stronger algorithms \u2013 is critical.<\/p>\n

How does CISA assess vulnerabilities across the 55 national critical functions?<\/h3>\n

That\u2019s primarily handled by the National Risk Management Center (NRMC). They assess vulnerabilities by analysing cross-sector interdependencies and prioritising outreach based on stakeholder feedback.<\/p>\n

Each critical infrastructure sector has unique risks, so we must work closely with stakeholders to understand their priorities and address vulnerabilities effectively. It\u2019s about balancing the categorisation of critical functions with real-world input from those directly involved.<\/p>\n

You mentioned NIST. How do you collaborate with other agencies to streamline this transition?<\/h3>\n

We collaborate extensively with agencies like the Office of Management and Budget (OMB), the Office of the National Cyber Director (ONCD), NSA, and others. We aim to speak with one voice across agencies, ensuring consistency and coordination. For instance, we work closely with NIST to assess cryptographic discovery and inventory tools, which help identify cryptographic elements in systems.<\/p>\n

International collaboration is also essential because divergent standards can create operational challenges. We engage with international partners and the private sector, emphasising the importance of adopting NIST\u2019s standards. This unified approach ensures that we\u2019re moving forward collectively.<\/p>\n

\"\"
\u00a9 shutterstock\/Marko Aliaksandr<\/figcaption><\/figure>\n

This is not just CISA leading the charge \u2013 it\u2019s a joint effort involving NIST, CISA, NSA, and other agencies like the Department of Energy (DOE), Department of Justice (DOJ), and the Department of Health and Human Services (HHS). Together, we\u2019re ensuring this transition is a coordinated and comprehensive process.<\/p>\n

How do you drive awareness and engagement with the private sector?<\/h3>\n

We engage the private sector through regular meetings and participation in industry conferences. We\u2019ve noticed a shift \u2013 initially, most conferences focused on AI, but now more are recognising the quantum threat. We\u2019re getting invited to larger platforms, like RSA, where we can reach broader audiences.<\/p>\n

Awareness is growing, but it\u2019s still like turning an aircraft carrier \u2013 it takes time. Once the industry fully grasps the threat, we expect momentum to build rapidly.<\/p>\n

How will you measure the success of the Post-Quantum Cryptography Initiative?<\/h3>\n

It\u2019s essential to examine how organisations are implementing these practices in terms of awareness and preparation.<\/p>\n

In terms of inventory discovery and risk assessment, understanding the risks within an organisation is a crucial measurement. For instance, if organisations can start generating policies that cover implementation, validation, and testing for quantum readiness, that\u2019s a positive step forward.<\/p>\n

Vendor management is another critical aspect. It\u2019s vital to ensure that vendors are engaged effectively to update and align products with the necessary specifications.<\/p>\n

Additionally, awareness and preparedness play significant roles. Executing early actions, such as establishing policies addressing the quantum threat, is essential. These policies should guide how organisations should approach the challenges posed by quantum technologies.<\/p>\n

While NSM 10 was a solid starting point, follow-up policies are necessary to build on that foundation. Creating comprehensive roadmaps is also important. We already have some roadmaps in place, but the level of effort required for each milestone on those roadmaps is a key factor to consider.<\/p>\n

Finally, I would like to highlight the incredible work of NIST, CISA, and other agencies over the past few years. We\u2019ve made tremendous progress in getting quantum threats on senior management\u2019s radar. A few years ago, this wasn\u2019t even part of the conversation, but now it\u2019s front and centre. That\u2019s a huge accomplishment, and it\u2019s critical we keep building on this momentum.<\/p>\n","protected":false},"excerpt":{"rendered":"

Dr Garfield Jones, Associate Chief of Strategic Technology at CISA, discusses the importance of post-quantum cryptography.<\/p>\n","protected":false},"author":15,"featured_media":54048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[24615],"tags":[530,793,24613],"acf":[],"yoast_head":"\nCISA: How post-quantum cryptography safeguards against quantum threats<\/title>\n<meta name=\"description\" content=\"Dr Garfield Jones, Associate Chief of Strategic Technology at CISA, discusses the importance of post-quantum cryptography.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA: How post-quantum cryptography safeguards against quantum threats\" \/>\n<meta property=\"og:description\" content=\"Dr Garfield Jones, Associate Chief of Strategic Technology at CISA, discusses the importance of post-quantum cryptography.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation News Network\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InnoNewsNetwork\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-08T10:10:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-08T10:16:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/12\/shutterstock_ArtemisDiana_2228719455.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jack Thomas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:site\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Thomas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/\"},\"author\":{\"name\":\"Jack Thomas\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/e34bceac54cf8934b0df3f4c8c2a649d\"},\"headline\":\"CISA: How post-quantum cryptography safeguards against quantum threats\",\"datePublished\":\"2025-01-08T10:10:32+00:00\",\"dateModified\":\"2025-01-08T10:16:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/\"},\"wordCount\":1316,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/12\/shutterstock_ArtemisDiana_2228719455.jpg\",\"keywords\":[\"Cybersecurity\",\"Quantum Computing\",\"Quantum Technology\"],\"articleSection\":[\"Quantum\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#respond\"]}],\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/\",\"name\":\"CISA: How post-quantum cryptography safeguards against quantum threats\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/12\/shutterstock_ArtemisDiana_2228719455.jpg\",\"datePublished\":\"2025-01-08T10:10:32+00:00\",\"dateModified\":\"2025-01-08T10:16:57+00:00\",\"description\":\"Dr Garfield Jones, Associate Chief of Strategic Technology at CISA, discusses the importance of post-quantum cryptography.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#primaryimage\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/12\/shutterstock_ArtemisDiana_2228719455.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/12\/shutterstock_ArtemisDiana_2228719455.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"\u00a9 shutterstock\/ArtemisDiana\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.innovationnewsnetwork.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA: How post-quantum cryptography safeguards against quantum threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"name\":\"Innovation News Network\",\"description\":\"Science, Research & Innovation News\",\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\",\"name\":\"Innovation News Network\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Innovation News Network\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InnoNewsNetwork\",\"https:\/\/x.com\/InnoNewsNetwork\",\"https:\/\/www.linkedin.com\/company\/innovation-news-network\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/e34bceac54cf8934b0df3f4c8c2a649d\",\"name\":\"Jack Thomas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b61be388a9781729729469d3dcf95087?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b61be388a9781729729469d3dcf95087?s=96&d=mm&r=g\",\"caption\":\"Jack Thomas\"},\"sameAs\":[\"https:\/\/www.innovationnewsnetwork.com\"],\"url\":\"https:\/\/www.innovationnewsnetwork.com\/author\/jackthomas\/\"}]}<\/script>\n","yoast_head_json":{"title":"CISA: How post-quantum cryptography safeguards against quantum threats","description":"Dr Garfield Jones, Associate Chief of Strategic Technology at CISA, discusses the importance of post-quantum cryptography.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/","og_locale":"en_GB","og_type":"article","og_title":"CISA: How post-quantum cryptography safeguards against quantum threats","og_description":"Dr Garfield Jones, Associate Chief of Strategic Technology at CISA, discusses the importance of post-quantum cryptography.","og_url":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/","og_site_name":"Innovation News Network","article_publisher":"https:\/\/www.facebook.com\/InnoNewsNetwork","article_published_time":"2025-01-08T10:10:32+00:00","article_modified_time":"2025-01-08T10:16:57+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/12\/shutterstock_ArtemisDiana_2228719455.jpg","type":"image\/jpeg"}],"author":"Jack Thomas","twitter_card":"summary_large_image","twitter_creator":"@InnoNewsNetwork","twitter_site":"@InnoNewsNetwork","twitter_misc":{"Written by":"Jack Thomas","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#article","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/"},"author":{"name":"Jack Thomas","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/e34bceac54cf8934b0df3f4c8c2a649d"},"headline":"CISA: How post-quantum cryptography safeguards against quantum threats","datePublished":"2025-01-08T10:10:32+00:00","dateModified":"2025-01-08T10:16:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/"},"wordCount":1316,"commentCount":0,"publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/12\/shutterstock_ArtemisDiana_2228719455.jpg","keywords":["Cybersecurity","Quantum Computing","Quantum Technology"],"articleSection":["Quantum"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#respond"]}],"copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/","url":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/","name":"CISA: How post-quantum cryptography safeguards against quantum threats","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#primaryimage"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/12\/shutterstock_ArtemisDiana_2228719455.jpg","datePublished":"2025-01-08T10:10:32+00:00","dateModified":"2025-01-08T10:16:57+00:00","description":"Dr Garfield Jones, Associate Chief of Strategic Technology at CISA, discusses the importance of post-quantum cryptography.","breadcrumb":{"@id":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#primaryimage","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/12\/shutterstock_ArtemisDiana_2228719455.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2024\/12\/shutterstock_ArtemisDiana_2228719455.jpg","width":1920,"height":1080,"caption":"\u00a9 shutterstock\/ArtemisDiana"},{"@type":"BreadcrumbList","@id":"https:\/\/www.innovationnewsnetwork.com\/cisa-how-post-quantum-cryptography-safeguards-against-quantum-threats\/54045\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.innovationnewsnetwork.com\/"},{"@type":"ListItem","position":2,"name":"CISA: How post-quantum cryptography safeguards against quantum threats"}]},{"@type":"WebSite","@id":"https:\/\/www.innovationnewsnetwork.com\/#website","url":"https:\/\/www.innovationnewsnetwork.com\/","name":"Innovation News Network","description":"Science, Research & Innovation News","publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.innovationnewsnetwork.com\/#organization","name":"Innovation News Network","url":"https:\/\/www.innovationnewsnetwork.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","width":1920,"height":1080,"caption":"Innovation News Network"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InnoNewsNetwork","https:\/\/x.com\/InnoNewsNetwork","https:\/\/www.linkedin.com\/company\/innovation-news-network\/"]},{"@type":"Person","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/e34bceac54cf8934b0df3f4c8c2a649d","name":"Jack Thomas","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b61be388a9781729729469d3dcf95087?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b61be388a9781729729469d3dcf95087?s=96&d=mm&r=g","caption":"Jack Thomas"},"sameAs":["https:\/\/www.innovationnewsnetwork.com"],"url":"https:\/\/www.innovationnewsnetwork.com\/author\/jackthomas\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2025-03-06 01:34:41","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/54045"}],"collection":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/comments?post=54045"}],"version-history":[{"count":3,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/54045\/revisions"}],"predecessor-version":[{"id":54050,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/54045\/revisions\/54050"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media\/54048"}],"wp:attachment":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media?parent=54045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/categories?post=54045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/tags?post=54045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}