Trusting Your Trusted Computer After Quantum Computing Arrives

Trusting Your Trusted Computer After Quantum Computing Arrives

quantum computing trusted computing cryptographic algorithms

Excerpts and salient points ~

+  Quantum computers have a couple of significant influences on the current state of cryptographic algorithms. The first is the ability of quantum computers to implement Grover’s algorithm.  The second influence results from the ability of quantum computers to run Shor’s algorithm efficiently.

It is important for those of us involved in trusted computing to keep an eye on the progress of NIST in their oversight of the analysis of the future of post-quantum cryptographic algorithms at https://csrc.nist.gov/Projects/Post-Quantum-Cryptography

+  Given the serious concerns of using existing algorithms to sign and authenticate data well into the future, the National Institute of Standards and Technology (NIST) in Gaithersburg, Md., has initiated a process to select possible algorithms to replace currently available asymmetric cryptographic algorithms.

Source:  DIGITALMUNITION.  David Sheers,  quantum computing trusted computing cryptographic algorithms…

Content may have been edited for style and clarity.

Share this article ...

Our Mission

At The Qubit Report, our mission is to promote knowledge and opinion of quantum computing from the casual reader to the scientifically astute.  Because Quantum is Coming.

Einstein Stroll