"Post-Quantum And Pre-Quantum Security Issues Grow"

General-purpose quantum computers will be capable of cracking the codes that protect much of the world's information. Although these machines do not fully exist yet, governments and businesses are already planning for post-quantum encryption. The task is made more difficult because it is unknown how future quantum machines will work or even which materials will be used. In contrast to traditional computers, the unit of information in a quantum computer is a quantum bit or qubit. Qubits can have a value of 0 or 1, or a superposition of both values. A useful computer will require qubits that are more reliable, error-corrected, long-lasting, and numerous than what is currently available. The power of these machines could be used to accelerate research in fields such as Artificial Intelligence (AI), pharmaceuticals, security, and more. As experts investigate Quantum Key Distribution (QKD) and other methods of cryptography based on quantum mechanics, the mainstreaming of quantum cryptography is expected to bring in a new era of data security. However, certain encryption methods based on classical computing principles will be rendered obsolete in a post-quantum world. As a result, countless systems will be vulnerable to attacks. However, there are more immediate concerns as security experts prepare for "Harvest Now, Decrypt Later" (HDNL) attacks. HNDL threats involve hackers collecting encrypted data now with the expectation that future advances in quantum computing will allow them to decrypt that data. According to a recent Deloitte survey, half of professionals at organizations considering quantum computing benefits believe their organizations are vulnerable to such attacks. This article continues to discuss pre-quantum and post-quantum challenges.

Semiconductor Engineering reports "Post-Quantum And Pre-Quantum Security Issues Grow"

Submitted by Anonymous on