Quantum computing calls for new encryption techniques?by uperkurk Tags: calls, computing, encryption, quantum, techniques 

#1
Dec712, 10:42 PM

P: 159

With the phenomenal speed to be expected from quantum computers in the future, todays encryption techniques such as RSA will be pretty much useless. A quantum computer could factorise 600bit+ numbers in a relatively short period of time. Aside from Shor's algorithm, are there any other mathematicians out there who are trying to invent a new algorithm?
It just hit me that when quantum computing starts to take over a "new internet" will need to be created. Any security we have at the moment will just be too weak. Networking, programming, websites, wireless, every aspect of security we have today will be completely useless due to the tremendous power that comes with quantum computing. 



#2
Dec812, 02:47 PM

P: 1,967

My own opinion is that like any computer you really need the hardware first before people can figure out the best ways to program the thing. We don't even know a lot of the science behind quantum computers and it looks like the learning curve will be steep. For example, just recently entanglement has been demonstrated to be contextual. That means the strength of the entanglement is dependent on the number of particles entangled and such basic knowledge could be critical to designing quantum security.




#3
Dec812, 07:02 PM

P: 494

Systems that depend on RSA type oneway/trapdoor factorization functions might be at risk but there are plenty of other systems that are immune to known technology largescale quantum computing.
http://www.pqcrypto.org/www.springer...0887010c1.pdf 



#4
Dec812, 07:35 PM

P: 166

Quantum computing calls for new encryption techniques?WPA2 is AES based and will remain secure provided the keylength is long enough. The TLS (secure http) key exchange is at risk, but the actual data encryption (which also uses AES) is not, and rolling out a new key exchange is just an RFC and a few patches away. Probably the most widespread use of public key cryptography is in the SSH protocol, but there are barriers to attack there. The most important is that the public key in an SSH channel isn't actually "public" the way it is for say PGP keys. This means risk of attack by Shor's is pretty low, since it operates on the public key (factors it)  not the encrypted datastream. 



#5
Mar2613, 09:15 PM

P: 4

Currently Quantum computers can only do simple maths such as 3x5=15



Register to reply 
Related Discussions  
'Advantages' of Quantum Encryption  Quantum Physics  8  
Encryption v.s. quantum computers  Quantum Physics  26 