{"id":30352,"date":"2016-09-20T18:02:41","date_gmt":"2016-09-21T01:02:41","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/09\/how-quantum-computing-could-unpick-encryption-to-reveal-decades-of-online-secrets"},"modified":"2017-06-04T14:14:23","modified_gmt":"2017-06-04T21:14:23","slug":"how-quantum-computing-could-unpick-encryption-to-reveal-decades-of-online-secrets","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/09\/how-quantum-computing-could-unpick-encryption-to-reveal-decades-of-online-secrets","title":{"rendered":"How quantum computing could unpick encryption to reveal decades of online secrets"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/how-quantum-computing-could-unpick-encryption-to-reveal-decades-of-online-secrets.jpg\"><\/a><\/p>\n<p>QC will need to be on any IT, Security, and\/ or tech connected product future state roadmap that spans a 5 + year period because the planning, funding, change management (retooling of resources), etc. will take time to plan &amp; prepare not to mention all those internal &amp; external dependencies and their own efforts around QC in the future because it truly would stink to see an AT&amp;T, or HomeDepot, etc. that invested in their own QC compliant infrastructure suddenly attacked because an external source that they pull from is not QC.<\/p>\n<hr>\n<p>The encryption we take for granted as being uncrackable would have a limited shelf-life in the quantum age, says a security expert.<\/p>\n<p><!-- Link: <a href=\"http:\/\/www.techrepublic.com\/article\/how-quantum-computing-could-unpick-encryption-to-reveal-decades-of-online-secrets\/\">http:\/\/www.techrepublic.com\/article\/how-quantum-computing-co...e-secrets\/<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>QC will need to be on any IT, Security, and\/ or tech connected product future state roadmap that spans a 5 + year period because the planning, funding, change management (retooling of resources), etc. will take time to plan &amp; prepare not to mention all those internal &amp; external dependencies and their own efforts around [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523,1625,1617,1492],"tags":[],"class_list":["post-30352","post","type-post","status-publish","format-standard","hentry","category-computing","category-encryption","category-quantum-physics","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/30352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=30352"}],"version-history":[{"count":3,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/30352\/revisions"}],"predecessor-version":[{"id":66187,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/30352\/revisions\/66187"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=30352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=30352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=30352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}