Not only are today's communications vulnerable, but quantum computers later could crack the digital signatures that ensure the integrity of updates to apps, browsers, operating systems and other software, opening a path for malware. It's a colossal effort, but it has to be done. It's an extraordinarily complex change that's on par with fixing Y2K bugs or upgrading internet communications from IPv4 to IPv6. But most of the burden for quantum-safe encryption rests on the shoulders of businesses, governments and cloud computing services that must design and install the technology. Quantum-safe encryption will come into your life through upgraded laptops, phones, web browsers and other products. Some of those companies, including IBM and Thales, have already begun offering products protected by what's called post-quantum cryptography. Some companies have embarked on an effort to create, test and adopt new encryption algorithms impervious to quantum computers. The computing industry is well aware of this potential vulnerability. But data surreptitiously gathered now could still be sensitive when more powerful quantum computers come online in a few years. Today's quantum computers are too rudimentary to do so. That'll lay bare private communications, company data and military secrets. Quantum computers, if they mature enough, will be able to crack much of today's encryption.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |