Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Quantum computers and cryptography for dummies
#1
Lightbulb 
Quote:
[Image: quantum-computing-vs-data-encryption-featured.jpg]

We explore how encryption protects your data and why quantum computers might shake things up.

Quantum computers are capable of very quickly solving very complex problems, such that even a supercomputer would be stumped for a long time. True, most of these problems are currently somewhat removed from real life, and quantum systems themselves are largely limited. But progress does not stand still, and this technology could one day take over the world. Here’s how that affects you and your data.

Data encryption at the heart of Internet security

At the heart of protecting data on computers and online lies encryption. Encrypting means using certain rules and a character set known as a key to transform the information one wants to send into a seemingly meaningless jumble. To understand what the sender wanted to say, the jumble has to be deciphered, also with a key.

One of the simplest examples of encryption is a substitution cipher whereby each letter is replaced with a number (say, 1 for A, 2 for B, and so on). In this example, the word “baobab” would become “2 1 15 2 1 2,” and the key would be the alphabet with each letter represented by a number. In practice, more complex rules are used, but the general idea remains more or less the same.

If, as in our example, all parties share one key, the cipher is said to be symmetric. Before communication can commence, everyone must receive the key to be able to encrypt their own and decrypt others’ messages. What’s more, the key has to be transmitted in unencrypted form (the receiving parties have nothing yet to decrypt it with). And if that happens over the Internet, cybercriminals might be able to intercept it and then read the supposedly secret messages. Not good.

To get around that problem, some encryption algorithms use two keys: one private to decrypt and one public to encrypt messages. The recipient creates both.

The private key is never shared with anyone, so it can’t be intercepted.

The second, public key is designed such that anyone can use it to encrypt information, but after that, decrypting the data requires the corresponding private key. For this reason, there is nothing to fear from sending the public key in unencrypted form or even sharing it for anyone on the Internet to see. This type of encryption is called asymmetric.

In modern encryption systems, the keys are usually very large numbers, and the algorithms themselves are built around complex mathematical operations involving these numbers. Moreover, the operations are such that reversing them is next to impossible. Therefore, knowing the public key is of no use in cracking the cipher.

Quantum cracking

There is a catch, however. Strictly speaking, cryptographic algorithms are designed so as to make cracking the cipher impossible in a reasonable amount of time.

That’s where quantum computers come in. They can crunch numbers far faster than traditional computers can.

Thus, the unreasonable amount of time a traditional computer would need to crack the cipher can become perfectly reasonable on a quantum computer. And if a cipher is vulnerable to quantum cracking, that negates the whole point of using the cipher.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
F-Secure 19.4
What's new in the ...harlan4096 — 09:44
Thunderbird Supernova 115.10.1
Thunderbird Supern...harlan4096 — 09:41
Microsoft Edge 124.0.2478.51
Version 124.0.2478...harlan4096 — 09:40
Rogue Anti-Malware 15.16.1
V15.16.1 04/12/202...harlan4096 — 09:39
Intel Xeon 6 6980P “Granite Rapids-AP” C...
Intel Xeon 6 specs...harlan4096 — 09:37

[-]
Birthdays
Today's Birthdays
avatar (36)RobertUtelt
Upcoming Birthdays
avatar (43)wapedDow
avatar (42)techlignub
avatar (41)Stevenmam
avatar (48)onlinbah
avatar (49)steakelask
avatar (43)Termoplenka
avatar (41)bycoPaist
avatar (47)pieloKat
avatar (41)ilyagNeexy
avatar (49)donitascene
avatar (49)Toligo

[-]
Online Staff
There are no staff members currently online.

>