Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By Alton Parrish (Reporter)
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

Quantum Computers Threaten to Destroy Internet Security As We Know It

% of readers think this story is Fact. Add your two cents.


The era of fully fledged quantum computers threatens to destroy internet security as we know it. Researchers are in a race against time to prepare new cryptographic techniques before the arrival of quantum computers, as cryptographers Tanja Lange (Eindhoven University of Technology) and Daniel J. Bernstein (University of Illinois at Chicago, USA) describe today in the journal Nature. In their publication they analyze the options available for this so-called post-quantum cryptography.

The expectation is that quantum computers will be built some time after 2025. Such computers make use of quantum-mechanical properties and can therefore solve some particular problems much faster than our current computers. This will be useful for calculating models for weather forecasts or developing new medicine. However, these operations also affect protection of data using RSA and ECC. With today’s technologies these systems will not be broken in a hundred years but a quantum computer will break these within days if not hours.

TU/e professor of Cryptology Tanja Lange. 

Photo: Bart van Overbeeke
‘Sensitive data in the open

Without protection a lot of sensitive information will be out in the open, even data from years back. “An attacker can record our secure communication today and break it with a quantum computer years later. All of today’s secrets will be lost,” warns Tanja Lange, professor of Cryptology at Eindhoven University of Technology. This concerns private data, bank and health records, but also state secrets. Lange saw the importance of alternative systems already back in 2006 and is busy with creating awareness and developing new systems. “Fairly recently we’re seeing an uptake of post-quantum cryptography in the security agencies, e.g., the NSA, and companies start demanding solutions.”

Research consortium

Lange leads the research consortium PQCRYPTO consisting of eleven universities and companies. PQCRYPTO started in 2015 with 3.9 million euro funding from the European Commission to develop new cryptographic techniques. “This might seem like a lot of money, but is a factor of 100 less than what goes into building quantum computers.” says Lange. She cautions that it is important to strengthen research in cryptography. “Bringing cryptographic techniques to the end user takes often another 15 to 20 years, after development and standardization.”

Shor’s algorithm

In their Nature publication Lange and Bernstein explain that a certain quantum algorithm, namely Shor’s algorithm, breaks all cryptographic techniques that are currently used to establish secure connections on the Internet. Candidates for post-quantum cryptography can roughly be categorized into two types: they are either very well understood and confidence-inspiring but require a lot of bandwidth or they are more convenient to use but provide more questionable security.

Nature

The publication appears in an issue of Nature with special attention to topics related to quantum computers: from different candidates of elementary building blocks of quantum computers till, e.g., the development of new algorithms. The journal invited Lange to write the article on post-quantum cryptography.

Contacts and sources:
Barry van der Meer
Eindhoven University of Technology

Citation: Daniel J. Bernstein & Tanja Lange, Post-quantum cryptography, Nature (14 September 2017). DOI: 10.1038/nature23461


Source: http://www.ineffableisland.com/2017/09/quantum-computers-threaten-to-destroy.html


Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 1 comment
    • jdpent01

      jdp…they should get the quantum cpu to design the needed computer security from firewalls to routers, multi source and single source systems. bio hex metric, and algorithmic routines that can distinguish between real and altered data, per haps instead of a binary system using a trinity system this is a 3 bit system where one bit is a control bit so it knows what is to follow and when that is un true it does a soft reset, of that function and id’s where the alt data came from by time, position, word, IP, TO INCLUDE THE SOURCE VIA PING PONG SYSTEM.SO IT WOULD BE VERY HARD TO FOOL A NANO QUANTUM SYSTEM. A QUANTUM SYSTEM MAY NEED FOUR OR MORE SOURCES TO BE VERIFY USERS A BIO SOURCE, A PIN SOURCE, A PHRASE SOURCE, AN ENCRYPTED SOURCE. AND SOME OF THESE COULD BE AUTOMATED. SO NO BODY KNOWS. AUTOMATE THE PIN AND ENCRYPTION EACH TIME LOGGING IN. TAKE THE FINGER PRINT MERGE WITH FACE RECOGNITION DIGITIZE, ENCRYPT FOR PROTECTION, THE PIN IS A RANDOM NUMBER GENERATED BY THE SYSTEM. ID THEFT had been to easy due to very simple non duplex inputs, encryption could be changed from 4 of 8 code to many of many code randomly, thus trying to figure out what code or pin would me most impossible.

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.