Quantum computers and cryptography for dummies
Quantum computers are capable of very quickly solving very complex problems, such that even a supercomputer mcafee.com/activate product key would be stumped for www.mcafee.com/activate a long time. True, most of these problems are currently somewhat removed from real life , and quantum systems themselves are largely www.mcafee.com/activate limited. But progress does not stand still, and this technology could one day take over the world. Here’s how that affects www.mcafee/activate you and your data.
Data encryption at the heart of Internet security
At the heart of protecting data on computers and online lies encryption. Encrypting means using certain rules and a www.mcafee.com/activate product key character set known as a key to transform the information one wants to send into a seemingly meaningless www.mcafee.com/activate jumble. www.mcafee.com/activate download To understand what the sender wanted to say, the jumble has to be deciphered, also with a key.
One of the simplest examples of encryption is a substitution cipher whereby each letter is replaced with a number (say, 1 for A, 2 for B, and so on). In this example, the word “baobab” would become “2 1 15 2 1 2,” and the key would be the alphabet with each letter represented by a number. In practice, more complex rules mcafee.com/activate product key are used www.mcafee/activate, but the general idea remains more or less the same.
If, as in our example, all parties share one key, the cipher is said to be symmetric. Before communication can commence, everyone must receive the key to be www.mcafee.com/activate product key able to encrypt their own and decrypt others’ messages www.mcafee.com/activate. What’s more, the key has to be transmitted in unencrypted form (the receiving parties have nothing yet to decrypt it with). And if that happens over the Internet, cybercriminals might be able to intercept it and then read the supposedly secret messages. Not good.
To get around that problem, some encryption algorithms use two keys: one private to decrypt and one public to encrypt messages. www.mcafee.com/activate download The recipient creates both. The private key is never shared with anyone, so it can’t be intercepted.
The second, public key is designed such that anyone can use it to encrypt information, but after that, decrypting the data requires the corresponding private key. For this reason, there is nothing to fear from sending www.mcafee.com/activate the public key in unencrypted form or even sharing it for anyone on the Internet to see. This type of encryption is called asymmetric.
In modern encryption systems mcafee.com/activate product key, the keys are usually very large numbers, and the algorithms themselves are built around complex mathematical operations involving these numbers. Moreover, the operations are www.mcafee.com/activate product key such that reversing them www.mcafee/activate is next to impossible. Therefore, knowing the public key is of no use in cracking the cipher
Quantum cracking
There is a catch, however. Strictly speaking, cryptographic algorithms are designed so as to make cracking the cipher impossible in a reasonable amount of time. That’s where quantum computers come in. They can crunch numbers far faster than traditional computers can.
Thus, the unreasonable amount of time a traditional computer would need to crack the cipher can become perfectly reasonable www.mcafee.com/activate on a quantum computer. And if a cipher is vulnerable to quantum cracking, that negates the whole point of using the cipher.
- Traditional encryption algorithms resistant to quantum attacks. It may be hard to believe, but we’re already using encryption methods that can stand up to quantum computers. www.mcafee.com/activate download For example, the widespread AES algorithm, used in instant messengers such as WhatsApp and Signal www.mcafee.com/activate, is too tough a nut — quantum computers accelerate the cracking process, but not by much www.mcafee.com/activate product key. Nor do they pose mcafee.com/activate product key a mortal threat to many other symmetric ciphers (that is, with only one key), although the abovementioned key distribution problem is still in effect here.
- Algorithms developed to protect against quantum attacks. Mathematicians are already devising new encryption algorithms that even mighty quantum technologies cannot crack. By the time cybercriminals arm themselves with quantum computers, data protection tools are likely to be able to fight back.
- Encryption with several methods at once. A decent solution that’s available right now is to encrypt data several times using different www.mcafee.com/activate algorithms www.mcafee/activate. Even www.mcafee.com/activate download if attackers crack one, they’re unlikely to break through the rest.
- Quantum technologies used against themselves. Using symmetric ciphers — which, as you’ll recall, are less vulnerable to quantum cracking — can be made more secure with quantum key distribution www.mcafee.com/activate systems. Such systems don’t guarantee protection against hackers, but they will let you know if information was intercepted, so if the encryption key is stolen in transit, mcafee.com/activate product key it can be scrapped and another one sent. True, that requires special www.mcafee.com/activate product key equipment, but such equipment is already available and in operation in some government organizations and private companies.
Comments
Post a Comment