<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-type="olc" bill-stage="Reported-in-Senate" dms-id="A1" public-private="public" slc-id="S1-MIR22A14-V8J-NN-SK0"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 S4592 RS: Quantum Computing Cybersecurity Preparedness Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2022-07-21</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><calendar>Calendar No. 635</calendar><congress>117th CONGRESS</congress><session>2d Session</session><legis-num>S. 4592</legis-num><associated-doc role="report">[Report No. 117–251]</associated-doc><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20220721">July 21, 2022</action-date><action-desc><sponsor name-id="S388">Ms. Hassan</sponsor> (for herself, <cosponsor name-id="S349">Mr. Portman</cosponsor>, <cosponsor name-id="S402">Ms. Rosen</cosponsor>, <cosponsor name-id="S384">Mr. Tillis</cosponsor>, <cosponsor name-id="S391">Mr. Young</cosponsor>, and <cosponsor name-id="S359">Mr. Heinrich</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSGA00" added-display-style="italic" deleted-display-style="strikethrough">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc></action><action stage="Reported-in-Senate"><action-date>December 13, 2022</action-date><action-desc>Reported by <sponsor name-id="S380">Mr. Peters</sponsor>, with an amendment</action-desc><action-instruction>Insert the part printed in italic</action-instruction></action><legis-type>A BILL</legis-type><official-title>To encourage the migration of Federal Government information technology systems to quantum-resistant cryptography, and for other purposes.</official-title></form><legis-body style="OLC" display-enacting-clause="yes-display-enacting-clause" id="H6A41F6D6383A45FBA36CF3D36FFE0D9C"><section section-type="section-one" id="H1233EF32BFCF482AA2B378D0987CA9CB"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Quantum Computing Cybersecurity Preparedness Act</short-title></quote>.</text></section><section id="H2E944A7602D3470A8398631B331B3884"><enum>2.</enum><header>Findings; sense of Congress</header><subsection id="HAA19CE363DDE4846BABEFD3F9FFBE862"><enum>(a)</enum><header>Findings</header><text>Congress finds the following:</text><paragraph id="H436676D024234CF3B16A5E1B52B06045"><enum>(1)</enum><text>Cryptography is essential for the national security of the United States and the functioning of the economy of the United States.</text></paragraph><paragraph id="HA8BA3B3F60AE4F038A1B81095F760AA4"><enum>(2)</enum><text>The most widespread encryption protocols today rely on computational limits of classical computers to provide cybersecurity.</text></paragraph><paragraph id="H570ACA62E0BA4BC6BB6B70E438217BD1"><enum>(3)</enum><text>Quantum computers might one day have the ability to push computational boundaries, allowing us to solve problems that have been intractable thus far, such as integer factorization, which is important for encryption.</text></paragraph><paragraph id="HEE7AA9573FDE4C329684208BC5ED9028"><enum>(4)</enum><text>The rapid progress of quantum computing suggests the potential for adversaries of the United States to steal sensitive encrypted data today using classical computers, and wait until sufficiently powerful quantum systems are available to decrypt it.</text></paragraph></subsection><subsection id="HD06D4C0D62E4423585FCAF0892BE1AFE"><enum>(b)</enum><header>Sense of Congress</header><text>It is the sense of Congress that—</text><paragraph id="H2D85306EBFEE4A8DA379C89E9059A7E9"><enum>(1)</enum><text>a strategy for the migration of information technology systems of the Federal Government to post-quantum cryptography is needed; and</text></paragraph><paragraph id="H23716F17CDBE41D5845DCD7CA9CE8F39"><enum>(2)</enum><text>the governmentwide and industrywide approach to post-quantum cryptography should prioritize developing applications, hardware intellectual property, and software that can be easily updated to support cryptographic agility.</text></paragraph></subsection></section><section id="id9AFD071A40964D1AB5948B00BA4B6484"><enum>3.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="H1EA8BD6F66724D19821A5F04C285FBF3"><enum>(1)</enum><header>Classical computer</header><text>The term <term>classical computer</term> means a device that accepts digital data and manipulates the information based on a program or sequence of instructions for how data is to be processed and encodes information in binary bits that can either be 0s or 1s.</text></paragraph><paragraph id="idD2C7AB6692774839B5C07BF1BAF56C1A"><enum>(2)</enum><header>Director of CISA</header><text>The term <term>Director of CISA</term> means the Director of the Cybersecurity and Infrastructure Security Agency.</text></paragraph><paragraph id="H4743B3ABE82444378F93BC5AD065CBD3"><enum>(3)</enum><header>Director of NIST</header><text>The term <term>Director of NIST</term> means the Director of the National Institute of Standards and Technology.</text></paragraph><paragraph id="H953D509961EB4F37AE1775B98EA60F47"><enum>(4)</enum><header>Director of OMB</header><text>The term <term>Director of OMB</term> means the Director of the Office of Management and Budget.</text></paragraph><paragraph id="HEC91E8251F1843178B423A11B6C41C25" commented="no"><enum>(5)</enum><header>Executive agency</header><text>The term <term>executive agency</term> has the meaning given the term <term>Executive agency</term> in section 105 of title 5, United States Code.</text></paragraph><paragraph id="H1B634C32E8D94FEEBF098F1592A3412C" commented="no"><enum>(6)</enum><header>Information technology</header><text>The term <term>information technology</term> has the meaning given the term in section 3502 of title 44, United States Code.</text></paragraph><paragraph id="HF0DC21A028964671BFF45B864D9A29F1" commented="no"><enum>(7)</enum><header>Post-quantum cryptography</header><text>The term <term>post-quantum cryptography</term> means a cryptographic system that—</text><subparagraph id="HE4FC56F77BD744C893E3DF403FE5B6A2" commented="no"><enum>(A)</enum><text>is secure against decryption attempts using a quantum computer or classical computer; and</text></subparagraph><subparagraph id="H4F3EE7BB926748CDB586F20CA577B4FB" commented="no"><enum>(B)</enum><text>can interoperate with existing communications protocols and networks.</text></subparagraph></paragraph><paragraph id="HF00CFC6479A34BECBC536EFBDFAA1E5A" commented="no" display-inline="no-display-inline"><enum>(8)</enum><header>Quantum computer</header><text>The term <term>quantum computer</term> means a computer that uses the collective properties of quantum states to perform calculations. </text></paragraph></section><section id="HC515E6C0933F4EB198BD4CFD3E360E3F"><enum>4.</enum><header>Inventory of cryptographic systems; migration to post-quantum cryptography</header><subsection id="H3C151B0B64D74CA481A26F414C524C4A"><enum>(a)</enum><header>Inventory</header><paragraph id="H05013D908F614344B07C56729CBBB71B"><enum>(1)</enum><header>Establishment</header><text>Not later than 180 days after the date of enactment of this Act, the Director of OMB shall establish, by rule or binding guidance, a requirement for each executive agency to establish and maintain an inventory of each cryptographic system in use by the agency.</text></paragraph><paragraph id="H4F74428EBDCD40E5819DC1953B12DCBF"><enum>(2)</enum><header>Additional content in rule or binding guidance</header><text>In the rule or binding guidance established by paragraph (1), the Director of OMB shall include, in addition to the requirement described under that paragraph—</text><subparagraph id="HB5DBAE0D02ED424DBD6FFDCE66AD5D64"><enum>(A)</enum><text>a description of information technology to be prioritized for migration to post-quantum cryptography;</text></subparagraph><subparagraph id="HD4BD9B93F3FA49FBB106606A7AA55D7C"><enum>(B)</enum><text>a description of the information required to be reported pursuant to subsection (b); and</text></subparagraph><subparagraph id="H9D853F784A4B44878EDA150B924B2B65"><enum>(C)</enum><text>a process for evaluating progress on migrating information technology to post-quantum cryptography, which shall be automated to the greatest extent practicable.</text></subparagraph></paragraph><paragraph id="H01FD34E0361543E385D3806B695B7EE0"><enum>(3)</enum><header>Periodic updates</header><text>The Director of OMB shall update the rule or binding guidance established by paragraph (1) as the Director determines necessary.</text></paragraph></subsection><subsection id="H9D0B9601DDC34104B1B8D25A9B7E075E"><enum>(b)</enum><header>Agency reports</header><text>Not later than 1 year after the date of enactment of this Act, and on an ongoing basis thereafter, the head of each executive agency shall provide to the Director of OMB, the Director of CISA, and the National Cyber Director an inventory of all information technology in use by the executive agency that is vulnerable to decryption by quantum computers, prioritized pursuant to the guidance issued under subsection (a)(2). </text></subsection><subsection id="H890A024190B840CE9AA2A586CEEBD15D"><enum>(c)</enum><header>Migration and assessment</header><paragraph id="H0DBBD27D78CA41D098464FA9656CAFE0"><enum>(1)</enum><header>Migration to post-quantum cryptography</header><text>Not later than 1 year after the date on which the Director of NIST has issued post-quantum cryptography standards, the Director of OMB shall issue guidance requiring each executive agency to develop a plan to migrate information technology of the agency to post-quantum cryptography.</text></paragraph><paragraph id="H4BEB0F69577D411CABCCCE046FE548F3"><enum>(2)</enum><header>Designation of systems for migration</header><text>Not later than 90 days after the date on which the guidance required by paragraph (1) has been issued, the Director of OMB shall issue guidance for <added-phrase reported-display-style="italic">executive</added-phrase> agencies to—</text><subparagraph id="H3403C6998DF24B009FEDC776F7CD09A6"><enum>(A)</enum><text>designate information technology to be migrated to post-quantum cryptography; and</text></subparagraph><subparagraph id="H8107AAC420724445BDB62F546081C20B"><enum>(B)</enum><text>prioritize information technology designated under subparagraph (A), on the basis of the amount of risk posed by decryption by quantum computers to that technology, for migration to post-quantum cryptography.</text></subparagraph></paragraph></subsection><subsection id="H281FD6E563B9433EB8830961B558A9AA"><enum>(d)</enum><header>Interoperability</header><text>The Director of OMB shall ensure that the designations and prioritizations made under subsection (c)(2) are assessed and coordinated to ensure interoperability.</text></subsection><subsection id="HD26C054E1E0C4600A7B6DBA6391E0B92"><enum>(e)</enum><header>Report on post-Quantum cryptography</header><text>Not later than 15 months after the date of enactment of this Act, the Director of OMB shall submit to Congress a report on the following:</text><paragraph id="H40C80CCBF903435E894BEEF6066E6829"><enum>(1)</enum><text>A strategy to address the risk posed by the vulnerabilities of information technology systems of executive agencies to weakened encryption due to the potential and possible capability of a quantum computer to breach that encryption.</text></paragraph><paragraph id="HF606F63FA922434C9FB60FBAFDF2B03A"><enum>(2)</enum><text>The amount of funding needed by executive agencies to secure the information technology systems described in paragraph (1) from the risk posed by an adversary of the United States using a quantum computer to breach the encryption of information technology systems.</text></paragraph><paragraph id="HE8EDBE87D5F54FE5926D0F33D1B10348"><enum>(3)</enum><text display-inline="yes-display-inline">A description of Federal civilian executive branch coordination efforts led by the National Institute of Standards and Technology, including timelines, to develop standards for post-quantum cryptography, including any Federal Information Processing Standards developed under <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, as well as standards developed through voluntary, consensus standards bodies such as the International Organization for Standardization.</text></paragraph></subsection><subsection id="HF655E6D71E914D6E8A23CB1700256F00"><enum>(f)</enum><header>Report on migration to post-Quantum cryptography in information technology systems</header><text>Not later than 1 year after the date on which the Director of OMB issues guidance under subsection (c)(2), and annually thereafter until the date that is 5 years after the date on which post-quantum cryptographic standards are issued, the Director of OMB shall submit to Congress, with the report submitted pursuant to section 3553(c) of title 44, United States Code, a report on the progress of executive agencies in adopting post-quantum cryptography standards.</text></subsection></section><section id="HAB40F8A819BD40058806CEBF14F2E075"><enum>5.</enum><header>Determination of budgetary effects</header><text display-inline="no-display-inline">The budgetary effects of this Act, for the purpose of complying with the Statutory Pay-As-You-Go Act of 2010, shall be determined by reference to the latest statement titled <quote>Budgetary Effects of PAYGO Legislation</quote> for this Act, submitted for printing in the Congressional Record by the Chairman of the House Budget Committee, provided that such statement has been submitted prior to the vote on passage.</text></section></legis-body><endorsement><action-date>December 13, 2022</action-date><action-desc>Reported with an amendment</action-desc></endorsement></bill> 

