For example, someone with a QC at some time in the future could perform a man-in-the-middle attack for a captured TLS negotiation, meaning the encryption within TLS protecting the confidentiality of the data would be broken.
But it can be difficult to motivate significant investment when things are currently working just fine, and the crash is a purely theoretical future problem.
It takes a concerted education campaign to impress on executives exactly why it’s so important — this isn’t just your ability to complete business-sized wire transfers, but your ability to email a colleague in confidence, or pay for a product on Amazon, or keep your browsing history secret.
Last year, the NSA announced its plans for transitioning to cryptography that is resistant to a quantum computer. Its just-released report talks about the importance of algorithm agility and quantum resistance. • May 9, 2016 AM Maybe a stupid (but genuine) question, how can a 'quantum resistant algorithm' be developed when quantum computers aren't properly a thing yet?
Sometime soon, it's going to have a competition for quantum-resistant public-key algorithms: Creating those newer, safer algorithms is the longer-term goal, Moody says. The capabilities and properties of those computers can't be fully known yet and any algorithm can't be tested against them.
Those research teams comprise the Quantum ICT Forum of Japan to strengthen the cross-disciplinary collaboration among the academia, industry and government.
The Project UQCC integrates those activities and relevant projects in Japan, and also offers a platform of international collaborations with projects in other countries.
A key part of this effort will be an open collaboration with the public, which will be invited to devise and vet cryptographic methods that -- to the best of experts' knowledge -- will be resistant to quantum attack. Kinda pointless, if you want to encrypt / decrypt something though ! Buy the book, watch the video, follow the instructions in the following chapters, in order to run forensic's over the video file(s), to extract the software, which has been exported, without a PERMIT......;) It's nearly as good as the old saying, around monkeys randomly typing out the complete works of William Shakespeare. Is it just that they'd be harder to crack in general? I have no problem with holding a competition to get the ball rolling; that's clearly a good idea.
NIST plans to launch this collaboration formally sometime in the next few months, but in general, Moody says it will resemble past competitions such as the one for developing the SHA-3 hash algorithm, used in part for authenticating digital messages. I know, it's silly hour here, but I've been trying to leave Australia for about 2 weeks now, unfortunetly, I can't until D. I just think it would be very easy to get it wrong or to subvert it given that far less is known about PQC and it would be impossible to test in the real world.
The conference featured 40 talks and 75 posters, with topics related not only to QKD technologies but to a much wider variety of quantum information technologies, such as quantum repeater, quantum memory, quantum metrology and simulations.