Difference between revisions of "Quantum Computing Threat"
(→Solutions) |
(→Solutions) |
||
Line 10: | Line 10: | ||
==Solutions== | ==Solutions== | ||
[[Public Key Cryptography]] has many benefits over [[Secret Key Cryptography]], the effort to create new algorithm to preserve the current PK protocols is underway now. | [[Public Key Cryptography]] has many benefits over [[Secret Key Cryptography]], the effort to create new algorithm to preserve the current PK protocols is underway now. | ||
− | + | * [https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf Getting Ready for Post-Quantum Cryptography:] NIST 2021-04-28 - Exploring Challenges Associated with Adopting and | |
+ | Using Post-Quantum Cryptographic Algorithms | ||
*[https://csrc.nist.gov/publications/detail/nistir/8105/final "Report on Post-Quantum Cryptography"] | *[https://csrc.nist.gov/publications/detail/nistir/8105/final "Report on Post-Quantum Cryptography"] | ||
*[https://www.imperialviolet.org/ ImperialViolet: Post-quantum confidentiality for TLS (2018-04-11)] | *[https://www.imperialviolet.org/ ImperialViolet: Post-quantum confidentiality for TLS (2018-04-11)] |
Revision as of 09:23, 28 April 2021
Full Title or Meme
Successful Quantum Computing creates an existential threat to existing algorithms since quantum computing algorithms exist to crack traditionally intractable solutions like RSA.
Context
Public key cryptography relies on certain mathematical problems that are very hard to solve, such as factoring large numbers that are the product of large prime numbers or finding the discrete logarithm of a random elliptic curve element with respect to a publicly known base point. If you know the private key components, you can sign the document or decrypt the data. If you don't have the private key and cannot solve the math, you cannot sign the document or decrypt the data.
Problem
Solutions
Public Key Cryptography has many benefits over Secret Key Cryptography, the effort to create new algorithm to preserve the current PK protocols is underway now.
- Getting Ready for Post-Quantum Cryptography: NIST 2021-04-28 - Exploring Challenges Associated with Adopting and
Using Post-Quantum Cryptographic Algorithms
- "Report on Post-Quantum Cryptography"
- ImperialViolet: Post-quantum confidentiality for TLS (2018-04-11)