Toggle light / dark theme

Jupiter has captured an icy comet from the outer solar system in a bizarre orbit that will bring it back to within 3 million kilometers of the giant planet in 2063. The only Sun-orbiting objects known to come closer were the fragments of Comet Shoemaker-Levy 9, which plunged into the Jovian cloud deck in July 1994.

A year ago, NASA’s asteroid-hunting ATLAS project in Hawai’i discovered 2019 LD2, and further observations showed it was a comet. New observations this spring confirmed it as a periodic comet and placed its orbit near Jupiter, leading Larry Denneau (University of Hawaii) to announce May 20th that P/2019 LD2 was the first comet among the Trojans. This family of several thousand asteroids shares Jupiter’s orbit but stays steady at about 60° ahead or behind of the planet. The discovery of a comet among Trojan asteroids was surprising because most of them are thought to have been captured in the solar system’s early years — any ices ought to have evaporated long ago.

However, when amateur astronomer Sam Deen used software on the Jet Propulsion Laboratory’s solar-system dynamics website to calculate the object’s orbit, he found P/2019 LD2 recently had a close encounter with Jupiter that left its orbit unstable. The model showed that the comet had likely been a Centaur, part of a family of outer solar system asteroids, with an orbit reaching out to Saturn. Then, on February 17, 2017, it passed about 14 million kilometers from Jupiter, an encounter that sent the comet on a wild ride and inserted it into an odd Jupiter-like orbit.

As far back as 2015, the National Institute of Standards and Technology (NIST) began asking encryption experts to submit their candidate algorithms for testing against quantum computing’s expected capabilities — so this is an issue that has already been front of mind for security professionals and organizations. But even with an organization like NIST leading the way, working through all those algorithms to judge their suitability to the task will take time. Thankfully, others within the scientific community have also risen to the challenge and joined in the research.

It will take years for a consensus to coalesce around the most suitable algorithms. That’s similar to the amount of time it took ECC encryption to gain mainstream acceptance, which seems like a fair comparison. The good news is that such a timeframe still should leave the opportunity to arrive at — and widely deploy — quantum-resistant cryptography before quantum computers capable of sustaining the number of qubits necessary to seriously threaten RSA and ECC encryption become available to potential attackers.

The ongoing development of quantum-resistant encryption will be fascinating to watch, and security professionals will be sure to keep a close eye on which algorithms and encryption strategies ultimately prove most effective. The world of encryption is changing more quickly than ever, and it has never been more important for the organizations dependent on that encryption to ensure that their partners are staying ahead of the curve.