"Quantum Computers Threaten Our Whole Cybersecurity Infrastructure: Here's How Scientists Can Bulletproof It"

The security of the RSA protocol relies on the current absence of an efficient algorithm to factorize large numbers. Cryptographic protocols require the adversary to factorize a very large number to decrypt a message, which is currently impossible. The existing privacy paradigm must be rethought if computing devices emerge to allow current cryptography systems to be easily cracked. This will be the case for quantum computers once they are fully operational. They will be able to crack RSA through a quantum algorithm for efficient factorization. Ideal quantum computers will be able to solve this problem in a few hours or even minutes, whereas traditional computers may require the lifetime of the universe to do so. Cryptographers are developing alternatives to RSA in order to achieve quantum-safe security. The goal is to develop cryptographic protocols that are secure against an adversary with access to a quantum computer. There are two primary methods for this: post-quantum cryptography and quantum key distribution. This article continues to discuss the threat posed by quantum computers to cybersecurity as well as the concepts of post-quantum cryptography and quantum key distribution. 

The Conversation reports "Quantum Computers Threaten Our Whole Cybersecurity Infrastructure: Here's How Scientists Can Bulletproof It"

Submitted by Anonymous on