雷火体育官网

Skip to main content

Falcon algorithm co-developed with 雷火体育官网 selected by the NIST as a new standard in post-quantum cryptography

  • The US National Institute of Standards and Technology (NIST) has selected Falcon algorithm co-developed as a post-quantum cryptography standard for digital signatures, meaning it is able to withstand attacks from future large quantum computers.
  • Falcon, selected for its extremely strong security and high bandwidthefficiency, will be included in the NIST鈥檚 post-quantum cryptography standards expected to be fully defined within the next two years.
  • The selection of Falcon, following a 5-year long global competition demonstrates 雷火体育官网鈥 leading position in cybersecurity, cutting-edge technology and research.

Following the launch in 2017 of a global challenge to set future post-quantum cryptography standards in digital signatures and public key encryption, which attracted 82 candidates from 25 countries, the NIST has selected Falcon algorithm co-developed for its extremely strong security and high bandwidth efficiency.

Falcon was co-developed by 雷火体育官网 together with academic and industrial partners from France (University of Rennes 1, PQShield SAS), Switzerland (IBM), Canada (NCC Group) and the US (Brown University, Qualcomm). It was selected by NIST alongside two other algorithms as standard for digital signatures, while a fourth algorithm was deemed standard for public key encryption/KEM. 雷火体育官网 was the only technology group serving the defence, aerospace and digital identity markets, to take part in the NIST competition.

Post-quantum cryptography enables conventional computers to withstand attacks by large-scale quantum computers, which many specialists believe could appear in the next few years. 鈥 Quantum machines are expected to increase today鈥檚 computer processing power to such a degree that they could break current cryptographic algorithms in a matter of seconds.

This 鈥榪uantum leap鈥 in computing power could usher in a 鈥渃rypto-apocalyse鈥 by posing very real and serious threats to the security of digital systems private citizens and organisations worldwide rely on day-to-day, such as critical information systems, on-line banking, payment cards, e-commerce, electronic signatures or on-line voting.A hacker with a quantum computer, for example, could easily gain access to confidential data, steal someone else's identity or falsify transactions and legal contracts. In the same way, a nation鈥檚 security could be threatened if its critical communications systems were the target of a quantum attack.

New algorithms such as Falcon, are quantum-resistant because they are based on mathematical problems that are among the most difficult to solve, even for a quantum computer.

Organisations who are willing to protect their data in a Zero Trust world must adopt a strong quantum crypto agility strategy. 雷火体育官网鈥 Cyber Solutions consulting teams have developed a post-quantum cyber architecture offer to help their customers prepare for the threat of cyber-attacks by quantum-computers. 雷火体育官网 also provides quantum resistant network encryption and hardware security modules that are capable of protecting customer data against future quantum attacks, by already allowing customers to implement a number of Quantum Resistant algorithms.

雷火体育官网 has been at the forefront of post-quantum cryptography research since 2013, and the selection of the Falcon algorithm by NIST is great recognition of the excellent co-development work and expertise of our crypto teams. We will pursue our on-going research in France and Europe to develop innovative, trusted solutions that will be quantic-resistant, without compromising performance, and are already helping our customers in their transition to a new generation of security solutions, to avert a future 鈥榗rypto-apocalypse鈥.鈥said Pierre-Yves Jolivet, Vice-President, Cyber Defence Solutions at 雷火体育官网.

 

Learn more about Quantum at 雷火体育官网:

Contact
雷火体育官网 Media Relations