Post-Quantum Cryptography at Google

Google, one of the front runners in the race for quantum computing, announced their first experiments with post-quantum cryptography. Why does it matter? If Google is starting to worry about post-quantum cryptography, maybe they had a breakthrough in large scale universal quantum computing? See the original blog post here: https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html Google’s Post-quantum cryptography experiment It’s time to explore options for quantum safe algorithms beyond theoretical implementations. Google has launched “CECPQ1” - a post-quantum key exchange ...

Read More

Why the NSA moving away from Suite B cryptography due to quantum computers makes total sense

TL;DR —Quantum computers could actually have been the trigger to begin the move to post-quantum cryptography.  Even though the Snowden files released in 2013 showed limited progress from the NSA on quantum computers, the last 2 years since have been a storm of real, practical results, as well as funding poured into both companies and academic research. One of the comments I most often hear is “Well, Snowden released documents in 2013 showing ...

Read More

Break RSA encryption with this one weird trick

Cryptographers HATE it! Too much math; didn’t read — Shor’s algorithm doesn’t brute force the entire key by trying factors until it finds one, but instead uses the quantum computer to find the period of a function which contains the RSA key and classically compute the greatest common divisor. RSA encryption is strong because factoring is a one-way problem. It’s very easy to multiply two primes together, but very difficult to find prime factors ...

Read More

Why don’t post-quantum encryption standards exist yet?

TL;DR — With increased funding, quantum computing is moving into a “Manhattan Project” era, where the timeline to a small, useable quantum computer could be drastically reduced. When the first quantum computers are ready to go in the next 5–10 years, we need to have security protocols in place. Post-quantum cryptography solutions do currently exist. We still have time, but we need to take the threat seriously. Establishing global post-quantum security standards Small, useable quantum computers ...

Read More

The Quantum Network Hacker Lab

TL;DR — Quantum computers are going to render a lot of current encryption techniques obsolete. Though quantum systems are inherently more secure, quantum networks and quantum key distribution suffer from some of the same vulnerabilities that classical networks do. How do we protect the quantum network? The first system has an opportunity to establish itself as a platform for quantum innovation. However, there’s also a looming question: how do we protect the quantum ...

Read More

How secure will our data be in the post-quantum era?

It’s the end of modern cryptography as we know it, and we feel fine. Build your security for the next 50 years. If the speed of processing doubles every two years, make sure your cryptographic systems can’t be brute forced in 50 years. If you use 2048 bit RSA, it will take some quadrillion years to break it. Good enough, right? Quantum computing is about to throw that all on its head, ...

Read More