An organization is evaluating post-quantum cryptography to secure sensitive data. Which measure is best for safeguarding against advanced computer-based attacks?
Depend on older factorization methods with a larger key size
Adopt symmetrical technology with shorter keys to reduce overhead
Rely on newly developed methods engineered to hinder factoring attacks
Use standard elliptic curve solutions widely adopted across industries
Post-quantum cryptography aims to replace algorithms like RSA and ECC that are vulnerable to quantum computing attacks. Instead of relying on older methods with larger key sizes, organizations should adopt new cryptographic techniques—such as lattice-based or multivariate schemes—specifically engineered to withstand quantum threats. These methods are part of ongoing NIST standardization efforts and provide better resilience for future-proof encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is post-quantum cryptography?
Open an interactive chat with Bash
Why are RSA and ECC vulnerable to quantum computing?