Trusting Your Trusted Computer After Quantum Computing Arrives

quantum computing trusted computing cryptographic algorithms

Excerpts and salient points ~

+  Quantum computers have a couple of significant influences on the current state of cryptographic algorithms. The first is the ability of quantum computers to implement Grover’s algorithm.  The second influence results from the ability of quantum computers to run Shor’s algorithm efficiently.

It is important for those of us involved in trusted computing to keep an eye on the progress of NIST in their oversight of the analysis of the future of post-quantum cryptographic algorithms at https://csrc.nist.gov/Projects/Post-Quantum-Cryptography

+  Given the serious concerns of using existing algorithms to sign and authenticate data well into the future, the National Institute of Standards and Technology (NIST) in Gaithersburg, Md., has initiated a process to select possible algorithms to replace currently available asymmetric cryptographic algorithms.

Source:  DIGITALMUNITION.  David Sheers,  quantum computing trusted computing cryptographic algorithms…

Content may have been edited for style and clarity.