From 5b9185cf3fb178999fdec96d1d6e012afa0790b1 Mon Sep 17 00:00:00 2001 From: root Date: Sun, 27 Feb 2022 21:28:08 +0000 Subject: Todos: quantum --- paper.ms | 21 ++++++++------------- refer | 19 +++++++++++++++++++ 2 files changed, 27 insertions(+), 13 deletions(-) diff --git a/paper.ms b/paper.ms index 232e75b..d326b73 100644 --- a/paper.ms +++ b/paper.ms @@ -247,31 +247,26 @@ observation of law enforcement, allowing illegal activity to occur In addition, the rate of development in unconventional computing methods is increasing rapidly. Effective quantum computing will -mean that existing popular cryptographic algorithms such as RSA will -no longer be secure due to the potential for computations that would -take unreasonable amounts of time on classical computers to be solved -quickly (reword) such as prime factorisation on which RSA encryption -relies {lily chen quantum}. RSA encryption is currently in use for -applications such as private communications and digital signatures. +mean that existing popular cryptographic algorithms such as RSA, which +is used for communications and digital signatures, would no longer be +secure {lily chen quantum}. Significant research such as at IBM in recent years (cite) has shown feasibility in current ideas surrounding quantum computing and promising results in development towards quantum supremacy and in the future the breakdown of current cryptographic methods. -Indeed, there -have already been claims to quantum supremacy in recent years (recent -years -- overused phrase), suggesting that quantum computers will soon +Indeed, there have been recent claims to quantum supremacy, +suggesting that quantum computers will soon become powerful enough to start making current encryption methods -obselete. Although this will be no overnight transformation, changes +obselete. Although this will not be an overnight transformation, changes will be made by those implementing cryptography, both in the open source space and in industry, as well as in government where government agencies must act in order to protect their data. This change will take place naturally and many have already started to -consider methods for `post-quantum cryptography' (cite). The +consider methods for `post-quantum cryptography' {nist alagic}. The significant factor however will be regulatory responses to -post-quantum cryptographic methods. +post-quantum cryptographic methods. https://www.natlawreview.com/article/preparing-post-quantum-migration-race-to-save-internet - https://csrc.nist.gov/Projects/post-quantum-cryptography https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/download/1225/665 https://universitypress.unisob.na.it/ojs/index.php/ejplt/index https://www.meritalk.com/articles/reps-khanna-mace-developing-quantum-computing-bill-to-secure-fed-data/ . diff --git a/refer b/refer index fbe658e..55383ed 100644 --- a/refer +++ b/refer @@ -225,6 +225,25 @@ %A Paolo Zialcita %O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back . +%T Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process +%D July 2020 +%J National Institute of Standards and Technology +%R NISTIR 8309 +%O DOI: 10.6028/NIST.IR.8309 +%A Gorjan Alagic +%A Jacob Alperin-Sheriff +%A Daniel Apon +%A David Cooper +%A Quynh Dang +%A John Kelsey +%A Yi-Kai Liu +%A Carl Miller +%A Dustin Moody +%A Rene Peralta +%A Ray Perlner +%A Angela Robinson +%A Daniel Smith-Tone + %T The Hidden Truth Anonymity in Cyberspace: Deep Web %D 2018 -- cgit v1.2.3