Google, one of the front runners in the race for quantum computing, announced their first experiments with post-quantum cryptography. Why does it matter? If Google is starting to worry about post-quantum cryptography, maybe they had a breakthrough in large scale universal quantum computing? See the original blog post here: https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html Google’s Post-quantum cryptography experiment It’s […]

# security

## Why the NSA moving away from Suite B cryptography due to quantum computers makes total sense

TL;DR —Quantum computers could actually have been the trigger to begin the move to post-quantum cryptography. Even though the Snowden files released in 2013 showed limited progress from the NSA on quantum computers, the last 2 years since have been a storm of real, practical results, as well as funding poured into both companies and academic research. […]

## Break RSA encryption with this one weird trick

Cryptographers HATE it! Too much math; didn’t read — Shor’s algorithm doesn’t brute force the entire key by trying factors until it finds one, but instead uses the quantum computer to find the period of a function which contains the RSA key and classically compute the greatest common divisor. RSA encryption is strong because factoring is a […]

## Why don’t post-quantum encryption standards exist yet?

TL;DR — With increased funding, quantum computing is moving into a “Manhattan Project” era, where the timeline to a small, useable quantum computer could be drastically reduced. When the first quantum computers are ready to go in the next 5–10 years, we need to have security protocols in place. Post-quantum cryptography solutions do currently exist. We still have time, […]

## The Quantum Network Hacker Lab

TL;DR — Quantum computers are going to render a lot of current encryption techniques obsolete. Though quantum systems are inherently more secure, quantum networks and quantum key distribution suffer from some of the same vulnerabilities that classical networks do. How do we protect the quantum network? The first system has an opportunity to establish itself as a […]

## How secure will our data be in the post-quantum era?

It’s the end of modern cryptography as we know it, and we feel fine. Build your security for the next 50 years. If the speed of processing doubles every two years, make sure your cryptographic systems can’t be brute forced in 50 years. If you use 2048 bit RSA, it will take some quadrillion years […]