Hi All
The advent of quantum computing technology will compromise many of the current cryptographic algorithms, especially public-key cryptography, which is widely used to protect digital information. Most algorithms on which we depend are used worldwide in components of many different communications, processing, and storage systems. Once access to practical quantum computers becomes available, all public-key algorithms and associated protocols will be vulnerable to criminals, competitors, and other adversaries. It is critical to begin planning for the replacement of hardware, software, and services that use public-key algorithms now so that information is protected from future attacks.
Regards
Caute_Cautim
This video alone was worth the click!
Post-Quantum Cryptography: the Good, the Bad, and the Powerful - YouTube
Preparete... pero relajete.
@Caute_cautim thank you for sharing this information with us.
@ericgeater Thanks for sharing.