Saturday, December 4

Steal Now, Decrypt Later: Attackers Who Steal Encrypted Data Store It While Waiting To Access It With Quantum Computers


That right now there are people who enter government servers without permission and steal data is something well known, and the reason for the continuous effort to better protect data and increase security measures around it. But now the United States government has encountered another dilemma: attackers who steal data they can’t decrypt, but saved for when quantum computers can.

Time for “post-quantum cryptography”

Quantum computing is taking giant steps and its potential promises to take a huge leap in data processing power, which could out-of-date current data encryption systems in no time. China is one of the countries that is investing more in this technology, and even in Spain we will see our own quantum computers this five years.

It is precisely these investments by powers like China that worry Dustin Moody, a mathematician at the National Institute of Standards and Technology. “The threat of an adversary nation-state obtaining a quantum computer big and accessing your information is real “.

That has meant that organizations such as the United States Department of Homeland Security have already gotten down to work to create new encryption algorithms to test future quantum computers. The practice already has its own name: post-quantum cryptography.

To motivate the finding, competitions have been organized with prizes for those with an algorithm capable of circumventing quantum computers, something that the United States wants to achieve. around the year 2024. It remains a difficult challenge, because there is still no consensus on even how those algorithms should work. But better to get to work now so as not to regret serious security conflicts in the future.



feeds.weblogssl.com