<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="H3E37BD72E43F4DFDA35CB50EADA3E62F" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>107 HR 5759 IH: Post Quantum Cybersecurity Standards Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2023-09-27</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">118th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 5759</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20230927">September 27, 2023</action-date><action-desc><sponsor name-id="J000308">Mr. Jackson of North Carolina</sponsor> (for himself and <cosponsor name-id="T000478">Ms. Tenney</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HSY00">Committee on Science, Space, and Technology</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To amend the National Quantum Initiative Act and the Cyber Security Research and Development Act to advance the rapid deployment of post quantum cybersecurity standards across the United States economy, support United States cryptography research, and for other purposes.</official-title></form><legis-body id="H8FF1994BEA9242CA81E8FBE604C7F8B3" style="OLC"><section id="H0D5AF8E58FE94B299E34C2F124CF9B26" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Post Quantum Cybersecurity Standards Act</short-title></quote>.</text></section><section id="H8C247DDA125943AB956F80C974BA9203"><enum>2.</enum><header>NIST cryptography programs and NSF cryptography research</header><subsection id="HEEAA895E331B4B02BA7AA0C3AFAFBBDD"><enum>(a)</enum><header>National Institute of Standards and Technology cryptography programs</header><text display-inline="yes-display-inline">The National Quantum Initiative Act is amended—</text><paragraph id="HA614FD2B14A04896A2E53F9A953D7AFB" commented="no"><enum>(1)</enum><text>in section 2 (<external-xref legal-doc="usc" parsable-cite="usc/15/8801">15 U.S.C. 8801</external-xref>)—</text><subparagraph id="HB36E4BBC32654D44BD3E9F8A60295DAB" commented="no"><enum>(A)</enum><text>by redesignating paragraphs (4), (5), (6), (7), the first paragraph (8) (relating to the definition of <quote>Subcommittee on Economic and Security Implications</quote>), and the second paragraph (8) (relating to the definition of <quote>Subcommittee on Quantum Information Science</quote>) as paragraphs (5), (7), (8), (9), (11), and (12), respectively;</text></subparagraph><subparagraph id="H0CC85DAA41634EE3B5D3200C6E7DB22E"><enum>(B)</enum><text>by inserting after paragraph (3) the following new paragraph:</text><quoted-block style="OLC" id="HC78856BA373F4E938143D5CB19D9ADBD" display-inline="no-display-inline"><paragraph id="H3887423225AA43A7BA7B81994813AD42"><enum>(4)</enum><header>Critical infrastructure</header><text display-inline="yes-display-inline">The term <quote>critical infrastructure</quote> has the meaning given such term in section 1016(e) of <external-xref legal-doc="public-law" parsable-cite="pl/107/56">Public Law 107–56</external-xref> (<external-xref legal-doc="usc" parsable-cite="usc/42/5195c">42 U.S.C. 5195c(e)</external-xref>)</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph id="H9E32EE3EB1FB47B2B6C170274BE50623" commented="no"><enum>(C)</enum><text display-inline="yes-display-inline">by inserting after paragraph (5), as so redesignated, the following new paragraph:</text><quoted-block id="HB28CCFA16797407AA5A4B9EA7A37061C" style="OLC"><paragraph id="H0D172FD0ECFE4AED8AB4A4267A08494F" commented="no"><enum>(6)</enum><header>Post-quantum cryptography</header><text>The term <quote>post-quantum cryptography</quote> means those cryptographic algorithms or methods that are assessed not to be specifically vulnerable to attack by either a quantum computer or classical computer.</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph><subparagraph id="H41C4B70A3AEA4520A4BC84CAB734818A"><enum>(D)</enum><text>by inserting after paragraph (9), as so redesignated, the following new paragraph:</text><quoted-block style="OLC" id="H2A415F3270E24B81ACCCE9F9A491D702" display-inline="no-display-inline"><paragraph id="HF4360ED35E7A401A9873A0DB4809089C"><enum>(10)</enum><header>Sector risk management agency</header><text display-inline="yes-display-inline">The term <quote>sector risk management agency</quote> has the meaning given such term in section 2200 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/650">6 U.S.C. 650</external-xref>). </text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="H999A41264CB0431D9008EB587499D052"><enum>(2)</enum><text>in section 201 (<external-xref legal-doc="usc" parsable-cite="usc/15/8831">15 U.S.C. 8831</external-xref>), by—</text><subparagraph id="H6BDE29A55A6C47CBA3A2FDAE3AEEA3E3"><enum>(A)</enum><text>redesignating subsection (c) as subsection (d); and</text></subparagraph><subparagraph id="HC7E109CAF230491884E374B08F8DDF1A"><enum>(B)</enum><text>inserting after subsection (b) the following new subsection:</text><quoted-block style="OLC" id="H94AA0E73EC2E482A8CD8B64952E3E07F" display-inline="no-display-inline"><subsection id="H9B4A2C29EA83420080F06E84CCDC361C"><enum>(c)</enum><header>Post quantum cryptography deployment</header><paragraph id="H7602DD1BF2C24964BD9D007ED78E8A59"><enum>(1)</enum><header>In general</header><text>The Director of the National Institute of Standards and Technology, in consultation with the Secretary of Homeland Security and the heads of sector risk management agencies, as appropriate, shall promote the voluntary adoption and deployment of post-quantum cryptography standards, including by—</text><subparagraph id="H43E41C0F99A54C7CBD55F85920369E99"><enum>(A)</enum><text>disseminating and making publicly available guidance and resources to help organizations adopt and deploy post-quantum cryptography standards;</text></subparagraph><subparagraph id="H6A5BF972EABB4355A97544DA5721FBD8"><enum>(B)</enum><text>providing technical assistance, as practicable, to entities that are high risk of quantum cryptoanalytic attacks, such as entities determined to be critical infrastructure or digital infrastructure providers; and</text></subparagraph><subparagraph id="HF48DB804C4E9406AABA04C4859CF47B5"><enum>(C)</enum><text>conducting such other activities as determined necessary by the Director to promote the adoption and deployment of post-quantum cryptography standards across the United States.</text></subparagraph></paragraph><paragraph id="H7BAB4EA14DFF48CF9C8B3249CC62406E"><enum>(2)</enum><header>Grant program</header><subparagraph id="HCCB4DFEFB6614BB5A6A5E005FE9F589E"><enum>(A)</enum><header>In general</header><text>Subject to the availability of appropriations and after the date on which the Director of National Institute of Standards and Technology has issued post-quantum cryptography standards under paragraph (1), the Director may establish a program to identify and provide technical assistance through the award of grants to entities that are at high risk of quantum cryptoanalytic attacks, including by granting funds, in adopting such post-quantum cryptographic standards and remediating quantum-related vulnerabilities.</text></subparagraph><subparagraph id="H516081CCCD324663B50369FC6A996B99"><enum>(B)</enum><header>Use of funds</header><text>Grants awarded to entities under this subsection may be used to cover reasonable costs, up to a specified amount established by the Director of the National Institute of Standards and Technology, of activities to adopt post-quantum cryptographic standards and remediate quantum-related vulnerabilities.</text></subparagraph><subparagraph id="HBFDC272F89EA4C679E107B7CF4D4DD0E"><enum>(C)</enum><header>Guidance</header><text display-inline="yes-display-inline">The Director of the National Institute of Standards and Technology may develop, and periodically update, guidance, including eligibility, application disclosure requirements, grant amount and duration, and any additional requirements regarding the award of grants under this paragraph.</text></subparagraph><subparagraph id="H83C6F5DAD7844BD186B00423DA1FB534"><enum>(D)</enum><header>Consultation</header><text display-inline="yes-display-inline">If the program described in this paragraph is established, the Director of the National Institute of Standards and Technology shall consult with the Director of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, the heads of other Sector Specific Agencies and risk management agencies, and appropriate representatives of private sector entities, including nonprofit organizations, to share information regarding the program and guidance developed under subparagraph (C).</text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection><subsection id="H8A5E600623864BB3A3D06F402682F3FA" commented="no"><enum>(b)</enum><header>National Science Foundation cryptography research</header><text>Subsection (a)(1)(A) of section 4 of the Cyber Security Research and Development Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7403">15 U.S.C. 7403</external-xref>) is amended by inserting <quote>, including post-quantum cryptography</quote> before the semicolon.</text></subsection></section></legis-body></bill> 

