aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms21
1 files changed, 8 insertions, 13 deletions
diff --git a/paper.ms b/paper.ms
index 232e75b..d326b73 100644
--- a/paper.ms
+++ b/paper.ms
@@ -247,31 +247,26 @@ observation of law enforcement, allowing illegal activity to occur
In addition, the rate of development in unconventional computing
methods is increasing rapidly. Effective quantum computing will
-mean that existing popular cryptographic algorithms such as RSA will
-no longer be secure due to the potential for computations that would
-take unreasonable amounts of time on classical computers to be solved
-quickly (reword) such as prime factorisation on which RSA encryption
-relies {lily chen quantum}. RSA encryption is currently in use for
-applications such as private communications and digital signatures.
+mean that existing popular cryptographic algorithms such as RSA, which
+is used for communications and digital signatures, would no longer be
+secure {lily chen quantum}.
Significant research such as at IBM in recent years (cite) has shown
feasibility in current ideas surrounding quantum computing and
promising results in development towards quantum supremacy and in the
future the breakdown of current cryptographic methods.
-Indeed, there
-have already been claims to quantum supremacy in recent years (recent
-years -- overused phrase), suggesting that quantum computers will soon
+Indeed, there have been recent claims to quantum supremacy,
+suggesting that quantum computers will soon
become powerful enough to start making current encryption methods
-obselete. Although this will be no overnight transformation, changes
+obselete. Although this will not be an overnight transformation, changes
will be made by those implementing cryptography, both in the open
source space and in industry, as well as in government where
government agencies must act in order to protect their data. This
change will take place naturally and many have already started to
-consider methods for `post-quantum cryptography' (cite). The
+consider methods for `post-quantum cryptography' {nist alagic}. The
significant factor however will be regulatory responses to
-post-quantum cryptographic methods.
+post-quantum cryptographic methods.
https://www.natlawreview.com/article/preparing-post-quantum-migration-race-to-save-internet
- https://csrc.nist.gov/Projects/post-quantum-cryptography
https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/download/1225/665
https://universitypress.unisob.na.it/ojs/index.php/ejplt/index
https://www.meritalk.com/articles/reps-khanna-mace-developing-quantum-computing-bill-to-secure-fed-data/ .