{"id":29324,"date":"2016-08-24T13:36:33","date_gmt":"2016-08-24T20:36:33","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/08\/the-nsa-plans-for-a-post-quantum-world"},"modified":"2017-06-04T09:54:25","modified_gmt":"2017-06-04T16:54:25","slug":"the-nsa-plans-for-a-post-quantum-world","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/08\/the-nsa-plans-for-a-post-quantum-world","title":{"rendered":"The NSA Plans for a Post-Quantum World"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/the-nsa-plans-for-a-post-quantum-world.jpg\"><\/a><\/p>\n<p>Hope they\u2019re working with QC researchers in Los Alamos and DARPA; it is the US Government which is known for its silos and multi-layer bureaucracies.<\/p>\n<hr>\n<p>\n<a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_computing\">Quantum computing<\/a> is a novel way to build computers \u2014 one that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers. In some cases, the algorithm speedups are extraordinary.<\/p>\n<p>Specifically, a quantum computer using something called Shor\u2019s algorithm can efficiently <a href=\"https:\/\/medium.com\/quantum-bits\/break-rsa-encryption-with-this-one-weird-trick-d955e3394870\">factor numbers<\/a>, breaking RSA. A variant can break Diffie-Hellman and other discrete log-based cryptosystems, including those that use elliptic curves. This could potentially render all modern public-key algorithms insecure. Before you panic, note that the largest number to date that has been factored by a quantum computer <a href=\"http:\/\/phys.org\/news\/2012-04-largest-factored-quantum-algorithm.html\">is 143<\/a>. So while a practical quantum computer is still science fiction, it\u2019s not <i>stupid<\/i> science fiction.<\/p>\n<p>(Note that this is completely different from <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/quantum-cryptography\">quantum<\/a> <a href=\"https:\/\/www.schneier.com\/essays\/archives\/2008\/10\/quantum_cryptography.html\">cryptography<\/a>, which is a way of passing bits between two parties that relies on physical quantum properties for security. The only thing quantum computation and quantum cryptography have to do with each other is their first words. It is also completely different from the <a href=\"http:\/\/www.wired.com\/2014\/03\/quantum\/\">NSA\u2019s QUANTUM<\/a> program, which is its code name for a <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2015\/04\/the_further_dem.html\">packet-injection system<\/a> that works directly in the Internet backbone.) <\/p>\n<p><!-- Link: <a href=\"https:\/\/thelasttechie.com\/2016\/08\/24\/the-nsa-plans-for-a-post-quantum-world\/\">https:\/\/thelasttechie.com\/2016\/08\/24\/the-nsa-plans-for-a-post-quantum-world\/<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hope they\u2019re working with QC researchers in Los Alamos and DARPA; it is the US Government which is known for its silos and multi-layer bureaucracies. Quantum computing is a novel way to build computers \u2014 one that takes advantage of the quantum properties of particles to perform operations on data in a very different way [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523,1625,1490,41,418,1412,1617,1492],"tags":[],"class_list":["post-29324","post","type-post","status-publish","format-standard","hentry","category-computing","category-encryption","category-government","category-information-science","category-internet","category-privacy","category-quantum-physics","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/29324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=29324"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/29324\/revisions"}],"predecessor-version":[{"id":60648,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/29324\/revisions\/60648"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=29324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=29324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=29324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}