cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Caute_cautim
Community Champion

The Quantum Computing Threat

Hi All

 

Yes it is back from 2019 but provides a good background to the threat.

 

Currently, post quantum cryptography usually involves public key algorithms that are considered secure against quantum attack. However, the most popular public-key algorithms are vulnerable to a strong quantum computer running Shor’s algorithm to solve the mathematical problems that created the security in the first place. By contrast, symmetric cryptographic algorithms and hash functions are thought to be relatively secure against quantum attacks. Cryptography researchers are always trying to prove the equivalence of a cryptographic algorithm and a known hard math problem. These proofs are known as ‘security reductions’ and they demonstrate the difficulty of cracking the algorithm.

Let’s explore the current state of practice in quantum resilience, which includes six different techniques: hash-based, code-based, lattice based, multivariate, supersingular elliptic curve isogeny and symmetric keys.

 

 

https://postquantum.com/post-quantum/quantum-computing-security/

 

Regards

 

Caute_Cautim

1 Reply
Caute_cautim
Community Champion

Hi @unknownop00 

 

Okay a joke is a joke, but this takes the biscuit - this is an advert for IPTV premium and its 65,000 channels.   Please advertise else where and not in an ISC2 security community.

 

Thank you

 

Regards

 

Caute_Cautim