ISM-1917

The development and procurement of new cryptographic equipment and software ensures support for the use of ML-DSA-87, ML-KEM-1024, SHA-384, SHA-512 and AES-256 by no later than 2030.

Topic
Transitioning to post-quantum cryptography
Applicable to
Non Classified, Official, Protected, Secret, Top Secret

History

Dec 2024
The development and procurement of new cryptographic equipment and software ensures support for the use of ML-DSA-87, ML-KEM-1024, SHA-384, SHA-512 and AES-256 by no later than 2030.
The existing control recommending that future cryptographic requirements and dependencies are considered during the transition to post-quantum cryptographic standards was replaced with a recommendation that the development and procurement of new cryptographic equipment and software ensures support for the use of ML-DSA-87, ML-KEM-1024, SHA-384, SHA-512 and AES-256 by no later than 2030.
Mar 2024
Future cryptographic requirements and dependencies are considered during the transition to post-quantum cryptographic standards.
A new control recommending that future cryptographic requirements and dependencies be considered during the transition to post-quantum cryptographic standards was added.