![]() The ongoing development of quantum-resistant encryption will be fascinating to watch, and security professionals will be sure to keep a close eye on which algorithms and encryption strategies ultimately prove most effective. The good news is that such a timeframe still should leave the opportunity to arrive at - and widely deploy - quantum-resistant cryptography before quantum computers capable of sustaining the number of qubits necessary to seriously threaten RSA and ECC encryption become available to potential attackers. That’s similar to the amount of time it took ECC encryption to gain mainstream acceptance, which seems like a fair comparison. It will take years for a consensus to coalesce around the most suitable algorithms. ![]() ![]() Thankfully, others within the scientific community have also risen to the challenge and joined in the research. But even with an organization like NIST leading the way, working through all those algorithms to judge their suitability to the task will take time. Now, we need to rapidly vet our new candidate algorithms to ensure they deserve our confidence in protecting the world’s monetary systems, confidential information and critical infrastructure.Īs far back as 2015, the National Institute of Standards and Technology (NIST) began asking encryption experts to submit their candidate algorithms for testing against quantum computing’s expected capabilities - so this is an issue that has already been front of mind for security professionals and organizations. The proven nature of these algorithms gives them tremendous value. The underpinnings of our current cryptographic infrastructure have been tested through real-world use on the world’s most attractive targets for several decades. Well-understood and vetted against potential attacks.Compatible with a vast range of software, hardware and services that we depend on today.Impractical to decrypt (without the private key) using either traditional or quantum computers.Fast to decrypt (with the private key) using traditional computers.Fast to encrypt using traditional computers.Any algorithm that proves suitable for widespread future use will have to meet multiple criteria: This is the computing environment in which our new, quantum-resistant algorithms will need to succeed. The platforms on which this encryption will operate will likewise be primarily traditional in architecture. ![]() Therefore, the encryption paradigms of the future need to be resistant to attacks not just from quantum computers but traditional computers as well. We should expect both architectures to live side by side, with traditional computing serving most tasks and quantum computing being employed for the specific operations where it offers improved efficiency. Quantum computers will not mean the end of traditional computers. ![]() Preparing For The Quantum Computing Revolution That gives thought leaders from the industry, academia and the government the opportunity to combine efforts and arrive at (and deploy) the quantum-resistant cryptographic solutions that the global economy will soon require. Though nobody knows for sure, many experts expect quantum computers to achieve this level of power within the next 10 years.įortunately, we know quantum computers are coming. The systems that use such encryption are referred to as "public key infrastructure," or PKI, and they are a necessary part of the confidential and mission-critical digital processes used for finance, commerce, communication, enterprise computing, transportation, defense, manufacturing, health care, government, logistics and every other aspect of our digital lives. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |