Tuesday, August 13, 2024

Cybersecurity: NIST Unveils 3 PQC Algorithms Ready for Immediate Use August 2024

https://www.meritalk.com/articles/nist-unveils-3-pqc-algorithms-ready-for-immediate-use/




NIST Unveils 3 PQC Algorithms Ready for Immediate Use






The Department of Commerce’s National Institute of Standards and Technology (NIST) today unveiled its first set of three encryption algorithms designed to withstand cyberattacks from a quantum computer – noting that, after nearly a decade of research, they are ready for immediate use.

NIST initiated its journey for quantum-resistant algorithms in 2015, selecting the top 15 from a batch of 82 submitted algorithms. In 2022, NIST announced its selection of four algorithms – CRYSTALS-Kyber, CRYSTALS-Dilithium, Sphincs+, and FALCON – slated for standardization and released draft versions of three of these standards last August.

“The advancement of quantum computing plays an essential role in reaffirming America’s status as a global technological powerhouse and driving the future of our economic security,” said Deputy Secretary of Commerce Don Graves. “Commerce bureaus are doing their part to ensure U.S. competitiveness in quantum, including the National Institute of Standards and Technology, which is at the forefront of this whole-of-government effort.”

“NIST is providing invaluable expertise to develop innovative solutions to our quantum challenges, including security measures like post-quantum cryptography that organizations can start to implement to secure our post-quantum future,” Graves added. “As this decade-long endeavor continues, we look forward to continuing Commerce’s legacy of leadership in this vital space.”

NIST noted that quantum computing could revolutionize fields from weather forecasting to fundamental physics to drug design, but it carries threats as well.

“Researchers around the world are racing to build quantum computers that would operate in radically different ways from ordinary computers and could break the current encryption that provides security and privacy for just about everything we do online,” NIST said in its press release.

Quantum computing technology is developing rapidly, and some experts predict that a device with the capability to break current encryption methods could appear within a decade, threatening the security and privacy of individuals, organizations, and entire nations.

“Quantum computing technology could become a force for solving many of society’s most intractable problems, and the new standards represent NIST’s commitment to ensuring it will not simultaneously disrupt our security,” said NIST Director Laurie Locascio. “These finalized standards are the capstone of NIST’s efforts to safeguard our confidential electronic information.”

The three finalized standards released today – CRYSTALS-Kyber, CRYSTALS-Dilithium, and Sphincs+ – contain the encryption algorithms’ computer code, instructions for how to implement them, and their intended uses. The fourth draft standard based on FALCON is planned for late 2024, NIST said.

“These finalized standards include instructions for incorporating them into products and encryption systems,” said NIST mathematician Dustin Moody, who heads the post-quantum computing standardization project. “We encourage system administrators to start integrating them into their systems immediately, because full integration will take time.”

Moody said that these standards are the primary tools for general encryption and protecting digital signatures.

NIST noted there have been no substantive changes made to the standards since the draft versions released last year, but it has changed the algorithms’ names to specify the versions that appear in the three finalized standards:

  • The CRYSTALS-Kyber algorithm – Federal Information Processing Standard (FIPS) 203 – is intended as the primary standard for general encryption. Among its advantages are comparatively small encryption keys that two parties can exchange easily, as well as its speed of operation. It has been renamed Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM).
  • The CRYSTALS-Dilithium algorithm – FIPS 204 – is intended as the primary standard for protecting digital signatures. It has been renamed Module-Lattice-Based Digital Signature Algorithm (ML-DSA).
  • The Sphincs+ algorithm – FIPS 205 – is also designed for digital signatures. The standard is based on a different math approach than ML-DSA, and it is intended as a backup method in case ML-DSA proves vulnerable. It has been renamed the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA).

Similarly, when the draft FIPS 206 standard built around FALCON is released, the algorithm will be dubbed FN-DSA, short for FFT (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature Algorithm.

To accommodate any ideas that cryptographers may have had since the initial 2015 call for submissions, NIST asked the public for additional algorithms in 2022 and has begun a process of evaluating them. NIST continues to evaluate two other sets of algorithms that could one day serve as backup standards, the agency said.

One of these sets consists of three algorithms designed for general encryption but based on a different type of math problem than the general-purpose algorithm in the finalized standards. NIST plans to announce its selection of one or two of these algorithms by the end of 2024.

The second set includes a larger group of algorithms designed for digital signatures. In the near future, NIST expects to announce about 15 algorithms from this group that will proceed to the next round of testing, evaluation, and analysis.

While analysis of these two additional sets of algorithms will continue, Moody said that any subsequent post-quantum cryptography standards will function as backups to the three that NIST announced today.

“There is no need to wait for future standards,” he said. “Go ahead and start using these three. We need to be prepared in case of an attack that defeats the algorithms in these three standards, and we will continue working on backup plans to keep our data safe. But for most applications, these new standards are the main event.”

CORRECTED LINKS: FEMA Releases Updated Guide to Help Communities with Resilience Grants Process

 

CORRECTED LINKS: FEMA Releases Updated Guide to Help Communities with Resilience Grants Process

bullhorn5Following valuable feedback from grant applicants, FEMA has updated the Hazard Mitigation Assistance Guide to make it more user-friendly. 

The update consolidates information and eligibility requirements for Hazard Mitigation Assistance (HMA) projects addressing air quality, drought, extreme temperatures, wildfire and wind. It also reflects recent policy changes to simplify program delivery through streamlined cost effectiveness methods and a lower benefit-cost analysis discount rate.

State, local, tribal and territorial governments may use the guide to navigate the application process and manage the grant lifecycle to receive critical resilience dollars. Information in the guide includes policies and processes to enable effective and consistent implementation across all HMA programs.

HMA provides funding to reduce the risk and impact of disasters such as wildfires, drought, extreme heat, hurricanes, earthquakes and flooding. Programs in HMA are Building Resilient Infrastructure and Communities (BRIC), Flood Mitigation Assistance, Hazard Mitigation Grant Program (HMGP) and HMGP Post Fire.

The update follows the update last year—the first since 2015—that incorporated climate change and future conditions, equity, building codes, capability and capacity building, nature-based solutions and community lifelines as key principles for its grant programs. It was also the first guide to cover BRIC.

This aligns with FEMA’s “people first” approach and helps communities build climate resilience through reducing complexity and barriers to accessing our HMA grant funds. It also aligns with the 2024 FEMA Year of Resilience theme to build capacity to withstand tomorrow’s hazards.

FEMA is offering two Office Hours sessions which provides an overview of the recent updates. Registration is now open.

  • Session #1: Aug. 15, 2-3 p.m. ET (Corrected link)
  • Session #2: Sept. 12, 2-3 p.m. ET (Corrected link)

Visit FEMA.gov to access the guide.

History. Sundown Towns may still exist throughout the U.S. in 2024. Is a gated community a Sundown Town?

How do you address crisis\disasters, and other emergency related events in these town?

Even delivery of products and services (FedEx, UPS, Door Dash, etc.)?

Any of these towns receive Federal or State funding?

BEMA International

1. Sundown Towns by State - History and Social Justice 
            https://justice.tougaloo.edu/sundown-towns/using-the-sundown-towns-database/state-map/

Thursday, August 8, 2024

Quantum Computing Cybersecurity Preparedness Act August 2024

 PQC’s $7.1 Billion Price Tag
Federal agencies will need to spend about $7.1 billion in the coming years to transition their high-priority IT systems to post-quantum cryptography (PQC) that will become vital to cybersecurity as quantum science advances sufficiently to break through current data encryption methods. That’s the bottom line from a report issued last month by the Office of Management and Budget (OMB), which said that a large chunk of that estimated spending will be needed to cover the cost of replacing government technology that cannot support new PQC systems. OMB’s report was mandated by the Quantum Computing Cybersecurity Preparedness Act signed into law by President Biden in late 2022, and requiring agencies to provide a prioritized inventory of cryptographic systems to the White House by May 2023. The Biden administration’s post-quantum executive order signed in 2022 calls for the transition of cryptographic systems to quantum-resistant cryptography by 2035.

Tuesday, July 30, 2024

EPA Releases Preliminary 2023 TRI Data

 

View as a webpage / Share

pipes discharging into waterway

EPA Releases Preliminary 2023 TRI Data

Today, the U.S. Environmental Protection Agency (EPA) published preliminary Toxics Release Inventory (TRI) data about chemical releases, waste management and pollution prevention activities that took place during 2023 at more than 20,000 federal and industrial facilities across the country. For 2023, 21 chemicals were added to the TRI list, and facilities were required to report on these if the reporting thresholds for each were met. The chemicals included nine per- and polyfluoroalkyl substances (PFAS) added to the TRI chemical list per the requirements of the 2020 National Defense Authorization Act (NDAA).

General Information on the 2023 Preliminary Data

The 2023 preliminary data were reported by facilities in covered industries that manufactured, processed or otherwise used substances on the TRI chemical list above threshold quantities during 2023. 

The public can use these data to:

  • Identify how many TRI facilities operate in a certain geographic area (e.g., a ZIP code),
  • Identify which chemicals are being managed by TRI facilities and in what quantities, and
  • Find out if a particular facility initiated any pollution prevention activities in the most recent calendar year.

The dataset released today contains the data as submitted by facilities and does not include any summary or trend analysis. While the preliminary data have not yet been through the complete TRI data quality process, the reporting software that facilities used to submit these data (TRI-MEweb) includes many automated quality checks that help prevent common mistakes during data entry. EPA is conducting additional quality checks to identify suspected reporting errors and follow up with facilities if data quality issues are identified. For details about the TRI data quality process, see the TRI Data Quality webpage.

EPA plans to publish a revised version of the dataset this October, which will include late submissions and revisions submitted by facilities. EPA will use the October dataset to develop the 2023 TRI National Analysis, which is expected to be published in early 2025.

The preliminary data are accessible on EPA's Envirofacts website. They are also available for download from the TRI website.

PFAS-Related Information

This is the fourth year that TRI data include reporting on PFAS added to the TRI list of chemicals under requirements established by the 2020 NDAA. EPA has received 156 TRI reporting forms for 44 discrete PFAS from 56 facilities. The preliminary data indicate facilities managed over 1,548,142 pounds of production-related waste of PFAS during 2023.

In October 2023, EPA finalized a rule to improve reporting on PFAS to the TRI by eliminating an exemption that allowed facilities to avoid reporting information on PFAS when those chemicals were used in small concentrations. EPA anticipates additional reporting on the quantities of PFAS released or otherwise managed as waste to begin with the 2024 TRI data.

Get the Data

Jamaican Independence RoofTop Celebration ­ August 6, 2024

 

Jamaica Independence Day Flag Raising - Aug 6