NIST Study: Quantum Computers Will Make Current Cryptography Obsolete

It's the digital equivalent of the evolutionary chase between predator venom and prey tolerance.

5. 9. 16 by Cecille De Jesus
Bank Info Security

Quantum Computers vs. Cryptography

The National Institute of Standards and Technology (NIST) says that in a matter of 20 years, our current cryptography systems will be outdated and easily cracked by quantum computers. This is a bit of a problem. As NIST mathematician Dustin Moody, who co-authored the report, notes, we need to start renovating the current cryptographic systems now, as it will take just as long (around 20 years) to get new algorithms selected, standardized, and implemented.

The world’s biggest computer companies have been focused on developing quantum computers for years. If developed, they would be millions of times faster than the supercomputers we have today (at least, in some regards). And recently, advancements in the quest to build one have been coming on amazingly fast.

In 2013, Google launched their quantum computer D-wave, which is said to be a staggering 100 million times faster than a conventional PC. This month, IBM opened access to their new quantum processor to the public via IBM Cloud. And things are really just getting started.

As Arvind Krishna, senior vice president and director at IBM Research, notes, “Quantum computing is becoming a reality and it will extend computation far beyond what is imaginable with today’s computers.”


Source: IBM News Room

Revamping Cryptography Starts Now

While the advancements in quantum computing are, without a doubt, milestones technologically speaking, these advancements require just as huge a leap in security systems. As NIST notes, the two go hand-in-hand.

To that end, the NIST is now working on new approaches to encryption to ensure they keep up with the advent of this new age and can withstand the power of quantum computers.

They have started initiatives to get stakeholders for a collaborative effort in developing new cryptographic approaches, as well as competitions much like that held for developing the SHA-3 hash algorithm.

Share This Article

Keep up.
Subscribe to our daily newsletter to keep in touch with the subjects shaping our future.
I understand and agree that registration on or use of this site constitutes agreement to its User Agreement and Privacy Policy


Copyright ©, Singularity Education Group All Rights Reserved. See our User Agreement, Privacy Policy and Cookie Statement. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of Futurism. Fonts by Typekit and Monotype.