Skip to content
Snippets Groups Projects
Commit 019a2c97 authored by Nouri-Alnahawi's avatar Nouri-Alnahawi
Browse files

add inro text to landing page

parent b2f130f1
No related branches found
No related tags found
1 merge request!6Draft: Merge Dev into Master
Pipeline #69955 passed
...@@ -13,13 +13,13 @@ linkTitle = "Cryptographic Migration & Agility" ...@@ -13,13 +13,13 @@ linkTitle = "Cryptographic Migration & Agility"
<a class="btn btn-lg btn-dark mr-3 mb-4" href="https://code.fbi.h-da.de/cspub/cma"> <a class="btn btn-lg btn-dark mr-3 mb-4" href="https://code.fbi.h-da.de/cspub/cma">
Original Paper <i class="fas fa-book ml-2 "></i> Original Paper <i class="fas fa-book ml-2 "></i>
</a> </a>
<p class="display-4">Community Site tracking the latest research efforts and developments regarding the migration to post-quantum cryptography</p> <p class="display-4">An open community site for sharing any relevant research, findings, and solutions on PQC migration and cryptographic agility.</p>
{{< blocks/link-down color="white" >}} {{< blocks/link-down color="white" >}}
</div> </div>
{{< /blocks/cover >}} {{< /blocks/cover >}}
{{< blocks/lead color="primary" >}} {{< blocks/lead color="primary" >}}
Some introduction text here Post-quantum cryptographic schemes have been under development for several years. Very soon there will be standardized post-quantum algorithms replacing the previous standards, which will eventually become obsolete. In order for quantum-resistant cryptographic Measures to be utilized, one needs more than simply developing secure post-quantum algorithms. The migration towards PQC poses great challenges on different levels. Those are not only restricted to the integration into existing protocols, but also include performance issues such as hardware specifications and memory usage, and especially the uncertainty of long term security of the new algorithm families. Moreover, a major challenge lies within finding suitable means of communicating and negotiating new algorithms and protocol parameters between different IT-systems. This leads to the urgent need for establishing the concept of crypto-agility, so as to be prepared for the rapid changes of cryptography, and insure the compatibility in all possible scenarios and settings.
{{< /blocks/lead >}} {{< /blocks/lead >}}
{{< blocks/section color="dark" >}} {{< blocks/section color="dark" >}}
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment