Skip Navigation

Thales Trusted Cyber Technologies Named as One of Twelve Collaborating Vendors in National Cybersecurity Center of Excellence Migration to Post-Quantum Cryptography Project

August 8, 2022

Thales Trusted Cyber Technologies (TCT), a trusted U.S. based source for cyber security solutions, today announced that it is collaborating with the National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE) in the Migration to Post-Quantum Cryptography Project Consortium to bring awareness to the issues involved in migrating to post-quantum algorithms and to develop practices to ease migration from current public-key algorithms to replacement algorithms.

As stated in NCCoE’s Migration to Post-Quantum Cryptography fact sheet, “The advent of quantum computing technology will render many of the current cryptographic algorithms ineffective, especially public-key cryptography, which is widely used to protect digital information. Most algorithms on which we depend are used worldwide in components of many different communications, processing, and storage systems. Once access to practical quantum computers becomes available, all public-key algorithms and associated protocols will be vulnerable to adversaries. It is essential to begin planning for the replacement of hardware, software, and services that use public-key algorithms now so that information is protected from future attacks”.

“Public-key cryptography is widely used to protect today’s digital information. With the advent of quantum computing, and its potential to compromise many of the current cryptographic algorithms, it is critical that organizations begin to plan for many of the technological and operational challenges that a migration to post-quantum cryptography will present. This project aims to help organizations in that effort” says from William Newhouse, Security Engineer, NIST NCCoE.

“Thales TCT is proud to be selected as a collaborating vendor in NCCoE’s Migration to Post-Quantum Cryptography Project Consortium” says Gina Scinta, Thales TCT Deputy CTO and Project Lead. “In addition to collaborating with NCCoE, we actively help our customers address the quantum threat today by implementing crypto agility into our solutions. Crypto agility allows our customers to deploy flexible, upgradeable solutions that support classic crypto, emerging quantum-resistant crypto standards, and approved hybrid techniques” says Scinta

Although Thales TCT is a Migration to Post-Quantum Project Consortium member, it should be noted that NIST does not evaluate commercial products under this Consortium and does not endorse any product or service used. Additional information on this consortium can be found at nccoe.nist.gov/crypto-agility-considerations-migrating-post-quantum-cryptographic-algorithms.

For more information on NCCoE’s Post-Quantum Cryptography efforts, please see:

About Thales Trusted Cyber Technologies

Thales Trusted Cyber Technologies, a business area of Thales Defense & Security, Inc., protects the most vital data from the core to the cloud to the field. We serve as a trusted, U.S. based source for cyber security solutions for the U.S. Federal Government. Our solutions enable agencies to deploy a holistic data protection ecosystem where data and cryptographic keys are secured and managed, and access and distribution are controlled.

For more information, visit www.thalestct.com

Thales TCT Locations

Headquarters:
3465 Box Hill Corporate Center Drive
Suite D
Abingdon, MD 21009
info@thalestct.com
443-484-7070
 
Glen Burnie Office:
504 McCormick Dr., Suites S&T
International Trade Center
Glen Burnie, MD 21061

 

Interested in Joining the Thales TCT Team?

Learn more about career opportunities at Thales TCT Careers

Connect with us

Learn more about our products, solutions and services Contact Thales TCT

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept