The Shorts | 8/3/21 | Cybersecurity and Cryptography in Quantum Computing

Einstein 1921 Portrait

The rate at which quantum computing is hitting the media stream is ever-increasing. This piece is a collection of articles and reports covering various aspects of quantum computing from the lens of cybersecurity and cryptography. Mea Cubitt

Quantum Defense for Crypto Would Decrease Usability, Study Shows | These are the results of a study conducted by Stephen Homes, Arqit’s chief product officer, and Liqun Chen from the University of Surrey. In the paper, the authors posit that quantum computers could in theory use Shor’s algorithm to break cryptocurrencies’ encryption. They believe this algorithm could break Elliptic Curve Digital Signature Algorithm (ECDSA) signatures, which many cryptocurrencies depend on.  Source: be[in]crypto.   Quantum Defense for Crypto Would Decrease Usability, Study Shows…

Better Security Through Obfuscation | Last year, three mathematicians published a viable method for hiding the inner workings of software. The paper was a culmination of close to two decades of work by multiple teams around the world to show that concept could work. The quest now is to find a way to make indistinguishability obfuscation (iO) efficient enough to become a practical reality.  Source: COMMUNICATIONS OF THE ACM.   Better Security Through Obfuscation…

Army scientist coauthors network performance for warfighters book | Cambridge University Press published the book, Network Tomography: Identifiability, Measurement Design, and Network State Inference, which is the result of collaboration between researchers at the U.S. Army Combat Capabilities Development Command, known as DEVCOM, Army Research Laboratory; IBM U.S.; and the University of Massachusetts-Amherst and Imperial College, London, under the auspices of the U.S.-U.K. Network and Information Sciences, International Technology Alliance, or NIS ITA.  Source: U.S.Army.   Army scientist coauthors network performance for warfighters book…

Preparing for the Post-Quantum Migration: A Race to Save the Internet | Most people don’t know or care to know, about cryptography. Without cryptography, the internet privacy that we all rely on for transmitting virtually all forms of digital communication would be insecure from attackers. Our current encryption methods are threatened by the breakthrough in quantum computing. Unless proactive steps are taken to mitigate this threat, large-scale quantum computers will tear down the backbone of the internet, secure communications.  Source: THE NATIONAL LAW REVIEW.   Preparing for the Post-Quantum Migration: A Race to Save the Internet…

Is Bitcoin (BTC) Safe from Grover’s Algorithm? | When crypto investors discuss quantum computing, they invariably worry about its potential to undermine encryption. Quantum computers alone do not pose such a mortal threat, however. It’s their capacity to exploit Shor’s algorithm that makes them formidable.  Source: yahoo!finance.   Is Bitcoin (BTC) Safe from Grover’s Algorithm?

Share this article ...

Our Mission

At The Qubit Report, our mission is to promote knowledge and opinion of quantum computing from the casual reader to the scientifically astute.  Because Quantum is Coming.

Einstein Stroll