Ressources
We have collected some ressources of importance for our work here.
- EU NIS Cooperation Group A Coordinated Implementation Roadmap for the Transition to Post-Quantum Cryptography EU recommendations for PQC migration in the EU member states: First steps by 2026, high risk applications completed by 2030, everything else by 2035.
- NIST (National Institute of Standards and Technology) NIST Releases First 3 Finalized Post-Quantum Encryption Standards The multi-year challenge to standardize post quantum encryption algorithms has concluded the work on its first three standards so that implementation following these standards can now be implemented.
- EU Commission Recommendation on a Coordinated Implementation Roadmap for the transition to Post-Quantum Cryptography The EU commission recommends it member states to migrate their IT to quantum safe state. For this, a subgroup shall be formed under the NIS Cooperation Group.
- BSI (German Federal Office for IT-Security) Kryptographische Verfahren: Empfehlungen und Schlüssellängen The technical recommendation BSI TR-02102-1 recommends Classical McEliece and FrodoKEM for KEM, while assuming that the NIST favourite CRYSTALS-Kyber (ML-KEM) after its standardization through NIST would be recommended, too. For signature methods it is recommended to combine classical and PQC methods in a hybrid way, as long as the implementation quality can not be guaranteed. Here, too, adding NIST favourites is promised.
- IT security agencies from Germany, France, Sweden and the Netherlands Position Paper on Quantum Key Distribution This common position of the security agencies of four countries puts QKD clearly in a “observe it, but don't use it now” category.
- US-Präsident Memorandum: Migrating to Post-Quantum Cryptography Requires all federal agencies to create an inventory of all their IT systems with cryptographic functions and to reserve budgets for a PQC migration.
- BSI (German Federal Office for IT-Security) Kryptografie quantensicher gestalten Summarizes the need for quantum-safe encryption and the (then) current state of the technology.