US government agency on Tuesday Four techniques She expects that they will keep computer data secret when quantum computers are mature enough to hack current encryption technology.
Scientists have proven that quantum computers can break the prevailing encryption technology if current progress in quantum computers continues long enough. The National Institute of Standards and Technology (NIST) has I supervised a research process to design and test post-quantum ciphers technology to protect that data.
Of the four technologies selected by the National Institute of Standards and Technology (NIST), two are expected to be in widespread use. one called keper crystalsto generate digital keys that two computers need to share encrypted data, and the other, Dilithium crystals, to sign encrypted data to determine who sent it. It will likely take two years for the methods to be standardized enough to be incorporated into today’s software and hardware.
Quantum computers are advancing steadily, but it will likely take years of work to create machines that are reliable and powerful enough to crack encryption. But it is still an urgent issue. It takes years to find new encryption methods, make sure they are secure and install them at scale. Government agencies and hackers can collect today’s potentially sensitive information with the expectation that they will be able to resolve it later when it remains valuable.
“We think 10 to 15 years is a popular view of attack timelines,” said Duncan Jones, head of cybersecurity for quantum computers and software maker Quantinuum. “But with the possibility of ‘hack now, decrypt later’, the attacks may already have started.”
Quantum computers can also undermine cryptocurrencies, which also use current cryptographic technology.