Once quantum computers crack traditional cryptographic algorithms can’t quantum computers also be used to make new ones? Isn’t that what that summary pretty much implies?🤔
The question would be whether modern consumer computers will be capable of implementing post-quantum cryptographic algorithms. At the moment, I don’t believe many can.
Post quantum cryptography exists in a way that we know algorithms that run on traditional hardware and are safe from quantum computers. They’re just not widely used.
Source: my ex did her PhD in that area and told me.
The problem is in theory not as big as it sounds. Quantum computing takes away one exponent. Meaning it reduces a complexity of 2^x to x.
But it also reduces 2xy only to x^y.
And we have cryptography that features that complexity, too.
In practice, quantum computers still are a very tough challenge, because our 2^x algorithms are virtually everywhere, and going through that is a similar effort as was the y2k problem, only with much much much more code, because y2k was 23 years ago
Once quantum computers crack traditional cryptographic algorithms can’t quantum computers also be used to make new ones? Isn’t that what that summary pretty much implies?🤔
The question would be whether modern consumer computers will be capable of implementing post-quantum cryptographic algorithms. At the moment, I don’t believe many can.
Post quantum cryptography exists in a way that we know algorithms that run on traditional hardware and are safe from quantum computers. They’re just not widely used.
Source: my ex did her PhD in that area and told me.
did y’all up cuz she broke your encryption keys and found out about all your infidelity?
No that was not it.
lol
no, not that, something else
Exactly. That’s what I was saying
yes
The problem is in theory not as big as it sounds. Quantum computing takes away one exponent. Meaning it reduces a complexity of 2^x to x.
But it also reduces 2xy only to x^y.
And we have cryptography that features that complexity, too.
In practice, quantum computers still are a very tough challenge, because our 2^x algorithms are virtually everywhere, and going through that is a similar effort as was the y2k problem, only with much much much more code, because y2k was 23 years ago