Podcast
Root Causes 447: NIST Deprecates RSA-2048 and ECC 256


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
December 13, 2024
As part of its post-quantum cryptography (PQC) initiative NIST has released a draft deprecating RSA-2048 and ECC 256 by 2030 and disallowing them by 2035. We get into the details.
Podcast Transcript
Lightly edited for flow and brevity.
And so the title of this document from NIST is Transition To Post-Quantum Cryptography Standards, NIST IR 8547, and this is - and I want to note this - an initial public draft that came out on November 12, 2024 and is basically within its comment period until sometime in January 2025. We're covering this early, Tim, because I think the implications of this document are very, very important.
Basically, what NIST is doing here is saying we intend to change our guidance on some cryptographic algorithms. Now this has happened in the past. The deprecation of SHA-1 and a number of other things. This has happened before. So there is precedence for this. However, to really just get the main message out of this document is that RSA 2048, ECC 256, so we're talking like the number one and number two cryptographic algorithms that are used today for things such as encryption of data in transit, SSL, publicly trusted certificates, a lot of you who have configured your private Certificate Authorities, you are probably using one or maybe even both of those cryptographic algorithms. What NIST is saying in this document, from my interpretation and from a lot of people's interpretation, is the deprecation of RSA 2048, ECC 256, will be by at some point in 2030 and a disallowed in 2035. So Tim, that's huge news.
And look how thorough and successful that was. And so this kind of guidance matters. Like, like, there's no enforcement here. NIST doesn't have the authority to force people to do this, or to punish them if they don't, or reward them if they do. But it is considered to be a very authoritative source of best practices and so when these kind of recommendations come out, they are very strong. A lot of people just follow the NIST guidelines and even if they don't, oftentimes those govern other guidelines.

