Post-Quantum Cryptography

Post-quantum cryptography is the science of encryption methods intended to defend against a quantum computer. Though they are not widely used yet due to instability and challenging technical design, quantum computers are gaining traction in the computing industry, especially as Google develops its own quantum computer. Rather than standard mathematical algorithms and bits, a quantum computer uses quantum mechanics and qubits, which are more changeable and flexible than bits. Quantum computing, then, uses concepts from quantum mechanics such as light particles and entanglement. Quantum mechanics is unpredictable and unreliable, and so too can be quantum computing.

In quantum computing, qubits do not hold only a value of 0 or 1 like bits do. In quantum physics, particles may not hold one value consistently. Quantum entanglement, the interdependency of particles upon each other, and the instability of qubit value both allow a quantum computer to compute many combinations of numbers at the same time, an advancement beyond standard encryption.

Encryption keys typically use a complex series of numbers (the more bits, the more complex) to make eavesdropping or decoding more difficult. If a quantum computer attempted to decode a standard encryption key, it would be much more successful. Hackers can spend a very long time attempting to guess number combinations; utilizing the shifting nature of quantum entanglement would allow them to guess combinations at an unheard-of rate.

Although quantum computing is neither very reliable nor widespread, it could develop much more quickly depending on the advances of Google and other large tech corporations. Security experts are concerned that the development of quantum computers will threaten standard cryptography. One possible method of defending against quantum computer attacks is quantum cryptography. Though it sounds very similar to post-quantum cryptography (and is very similar), it accomplishes a slightly different goal. Quantum cryptography secures data transmission by using photons to create a secret encryption key. Any attempt to eavesdrop or interfere with the communication causes a clear disturbance, allowing users to terminate a connection or identify an attempted hack. There are also more complex cryptographic techniques that could help prevent quantum computing attacks, including creating encryption keys with much longer sequences of bits, which could make it more difficult for a quantum computer to guess a combination of numbers.






Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...