An organization is evaluating post-quantum cryptography to secure sensitive data. Which measure is best for safeguarding against advanced computer-based attacks?
Use standard elliptic curve solutions widely adopted across industries
Rely on newly developed methods engineered to hinder factoring attacks
Depend on older factorization methods with a larger key size
Adopt symmetrical technology with shorter keys to reduce overhead
Post-quantum cryptography aims to replace algorithms like RSA and ECC that are vulnerable to quantum computing attacks. Instead of relying on older methods with larger key sizes, organizations should adopt new cryptographic techniques—such as lattice-based or multivariate schemes—specifically engineered to withstand quantum threats. These methods are part of ongoing NIST standardization efforts and provide better resilience for future-proof encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are quantum computing attacks in cryptography?
Open an interactive chat with Bash
What is lattice-based cryptography, and why is it important?
Open an interactive chat with Bash
What role does NIST play in standardizing post-quantum cryptography?