Skip to content
arrow_back
search
ISM-1996 policy ASD Information Security Manual (ISM)

Using Hybrid Schemes for Secure Encryption

Ensure at least one encryption method is approved for strong protection against future quantum threats.

record_voice_over

Plain language

This control is about using a combination of current and new methods to keep your data safe from future threats, including those posed by advanced computers yet to come. It matters because if you don't prepare now, your sensitive information could be at risk when these powerful new technologies become available, potentially leading to data breaches or loss of customer trust.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When a post-quantum traditional hybrid scheme is used, either the post-quantum cryptographic algorithm, the traditional cryptographic algorithm or both are AACAs.
policy ASD Information Security Manual (ISM) ISM-1996
priority_high

Why it matters

If neither algorithm in a post-quantum/traditional hybrid is an AACA, encrypted data may be compromised as cryptanalysis improves or quantum attacks emerge.

settings

Operational notes

Regularly review your PQ/traditional hybrid so that at least one component algorithm is an AACA, and replace any component that is no longer assessed as AACA.

Mapping detail

Mapping

Direction

Controls