Quantum Cryptography Series, Explanations


Quantum Cryptography Series, Explanations.  
Keeping ourselves reminded, or perhaps getting a first dose of what quantum computing, cybersecurity, and quantum cryptography all have in common, is becoming a necessity in the cybersecurity world.  The U.S. National Institute of Standards and Technology (NIST) is working diligently on post-quantum cryptography. 

What is this?  When quantum computers become sufficiently capable at computing, the likelihood that privacy, confidentiality, and integrity of encrypted data will become vulnerable to revealing the contents is quite high.  To better understand the issues surrounding these aspects, Privacy News Online has produced a series of discussions covering the topic.  The four parts and their links are below. 

NIST Round 2 and Post-Quantum Cryptography (part 1)

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms

Well worth the read.  Because quantum is coming.  Qubit.

 

Share this article ...

Our Mission

At The Qubit Report, our mission is to promote knowledge and opinion of quantum computing from the casual reader to the scientifically astute.  Because Quantum is Coming.

Einstein Stroll