{"id":32161,"date":"2016-11-23T22:32:15","date_gmt":"2016-11-24T06:32:15","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/11\/how-will-quantum-computing-impact-security-processes"},"modified":"2017-06-04T14:01:52","modified_gmt":"2017-06-04T21:01:52","slug":"how-will-quantum-computing-impact-security-processes","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/11\/how-will-quantum-computing-impact-security-processes","title":{"rendered":"How will quantum computing impact security processes?"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/how-will-quantum-computing-impact-security-processes.jpg\"><\/a><\/p>\n<p>How does one prevent hacking from a QC system? Easy, on board to QC first before others do.<\/p>\n<hr>\n<p>Quantum computers have the potential to perform calculations faster than ever possible before, inviting a significant rethink in how we approach cyber security.<\/p>\n<p>Given the amount of research being ploughed into this area, we are likely to see a commercially viable machine in the near future, so cryptographers and the cyber security industry in general should work to have a clear view on the implications way ahead of that achievement.<\/p>\n<p><strong>Sure, But What Is Quantum Computing?<\/strong><\/p>\n<p>Every current computer \u2014 smartphones, laptops, smart TVs \u2014 manipulates binary digits (bits), and these bits can only have two values: \u201c0\u201d or \u201c1\u201d. <em>(Note: bits are also used to quantify the strength of an encryption method e.g. 128-bit, 256-bit encryption\u2026 the more the better!)<\/em> Quantum computers, however, use <em>quantum bits<\/em> (also known as \u201cqubits\u201d), where the value can be 0, 1 or both.<\/p>\n<p><!-- Link: <a href=\"http:\/\/betanews.com\/2016\/11\/23\/quantum-computing-security\/\">http:\/\/betanews.com\/2016\/11\/23\/quantum-computing-security\/<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How does one prevent hacking from a QC system? Easy, on board to QC first before others do. Quantum computers have the potential to perform calculations faster than ever possible before, inviting a significant rethink in how we approach cyber security. Given the amount of research being ploughed into this area, we are likely to [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1625,1512,1617],"tags":[],"class_list":["post-32161","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-encryption","category-mobile-phones","category-quantum-physics"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/32161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=32161"}],"version-history":[{"count":3,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/32161\/revisions"}],"predecessor-version":[{"id":65719,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/32161\/revisions\/65719"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=32161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=32161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=32161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}