Post-Quantum Cryptography Definition & Meaning

Post-quantum cryptography is the science of encryption methods intended to defend against a quantum computer. Though they are not widely used yet due to instability and challenging technical design, quantum computers are gaining traction in the computing industry, especially as Google develops its own quantum computer. Rather than standard mathematical algorithms and bits, a quantum computer uses quantum mechanics and qubits, which are more changeable and flexible than bits. Quantum computing, then, uses concepts from quantum mechanics such as light particles and entanglement. Quantum mechanics is unpredictable and unreliable, and so too can be quantum computing.

In quantum computing, qubits do not hold only a value of 0 or 1 like bits do. In quantum physics, particles may not hold one value consistently. Quantum entanglement, the interdependency of particles upon each other, and the instability of qubit value both allow a quantum computer to compute many combinations of numbers at the same time, an advancement beyond standard encryption.

Encryption keys typically use a complex series of numbers (the more bits, the more complex) to make eavesdropping or decoding more difficult. If a quantum computer attempted to decode a standard encryption key, it would be much more successful. Hackers can spend a very long time attempting to guess number combinations; utilizing the shifting nature of quantum entanglement would allow them to guess combinations at an unheard-of rate.

Although quantum computing is neither very reliable nor widespread, it could develop much more quickly depending on the advances of Google and other large tech corporations. Security experts are concerned that the development of quantum computers will threaten standard cryptography. One possible method of defending against quantum computer attacks is quantum cryptography. Though it sounds very similar to post-quantum cryptography (and is very similar), it accomplishes a slightly different goal. Quantum cryptography secures data transmission by using photons to create a secret encryption key. Any attempt to eavesdrop or interfere with the communication causes a clear disturbance, allowing users to terminate a connection or identify an attempted hack. There are also more complex cryptographic techniques that could help prevent quantum computing attacks, including creating encryption keys with much longer sequences of bits, which could make it more difficult for a quantum computer to guess a combination of numbers.






Jenna Phipps
Jenna Phipps
Jenna Phipps is a contributor for websites such as Webopedia.com and Enterprise Storage Forum. She writes about information technology security, networking, and data storage. Jenna lives in Nashville, TN.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

UPDATED: This article was updated April 6, 2021 by Web Webster   From A3 to ZZZ we list 1,559 text message and online chat abbreviations to...

How to Create a Website Shortcut on Your Desktop

UPDATED: This article was updated April 6, 2021 by Web Webster   This Webopedia guide will show you how to create a desktop shortcut to a...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

What are the 5 Generations of Computers?

UPDATED: This article was updated on April 6, 2021 by Web Webster   Learn about each of the 5 generations of computers and major technology developments...

Random Access Memory (RAM)...

UPDATED: This article Updated April 6, 2021 by Web Webster   Random Access Memory (RAM)...

OEM – original equipment...

UPDATED: This article was updated April 6, 2021 by Web Webster OEM (pronounced as...

Best ERP Software for...

UPDATED: This page was updated April 6, 2021 by Web Webster   Enterprise resource planning...