aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-02-19 16:19:41 +0000
committerroot <root@turin.home>2022-02-19 16:19:41 +0000
commit44be895e85e2db5269f3f6608f4349ebf960893d (patch)
tree3cb9d4c380b6b5434ea4341dadd467e3d45a95cb
parent84102b68aabaec8755612be5619057eb36ad5dce (diff)
parent07f08d061a52af8bf62d1c1ecaed22f1bcdff14e (diff)
Merge branch 'master' of mohit.uk:/srv/git/epq
-rw-r--r--paper.ms21
1 files changed, 18 insertions, 3 deletions
diff --git a/paper.ms b/paper.ms
index b79f1d0..01a2a89 100644
--- a/paper.ms
+++ b/paper.ms
@@ -231,7 +231,7 @@ been in China, where the government has unparalleled control over the
flow of information over the internet. This has allowed the filtering
of content, prevention from accessing sites, and the blocking of the
anonymity network Tor which would allow users to circumvent measures
-put in place by the government {firewall} (cite for Tor). (research:
+put in place by the government {firewall} (cite for Tor). (research?:
would such measures even work in western world?)
In addition, the rate of development in unconventional computing
@@ -246,9 +246,24 @@ Significant research such as at IBM in recent years (cite) has shown
feasibility in current ideas surrounding quantum computing and
promising results in development towards quantum supremacy and in the
future the breakdown of current cryptographic methods.
-
Indeed, there
-have already been claims (although disputed) to quantum supremacy from
+have already been claims to quantum supremacy in recent years (recent
+years -- overused phrase), suggesting that quantum computers will soon
+become powerful enough to start making current encryption methods
+obselete. Although this will be no overnight transformation, changes
+will be made by those implementing cryptography, both in the open
+source space and in industry, as well as in government where
+government agencies must act in order to protect their data. This
+change will take place naturally and many have already started to
+consider methods for `post-quantum cryptography' (cite). The
+significant factor however will be regulatory responses to
+post-quantum cryptographic methods.
+
+ https://www.natlawreview.com/article/preparing-post-quantum-migration-race-to-save-internet
+ https://csrc.nist.gov/Projects/post-quantum-cryptography
+ https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/download/1225/665
+ https://universitypress.unisob.na.it/ojs/index.php/ejplt/index
+ https://www.meritalk.com/articles/reps-khanna-mace-developing-quantum-computing-bill-to-secure-fed-data/
Once more, the significant research is occurring as aforementioned in
the US and in China {quantum research in china}. Both in the US at