TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: If Quantum Computers Destroy Keypair Encryption, What Are Alternatives?

9 pointsby markhendersonover 7 years ago
Every now and again I see an article like this pop up: https:&#x2F;&#x2F;www.technologyreview.com&#x2F;s&#x2F;609408&#x2F;quantum-computers-pose-imminent-threat-to-bitcoin-security&#x2F;<p>Let&#x27;s assume it&#x27;s true. Public &#x2F; Private keypair encryption (via cryptobox) is a big part of the backbone of an app I&#x27;m working on. Is there any way to future proof my crypto in case the Quantum Computers do destroy any security we thought we had?

3 comments

techjuiceover 7 years ago
More scientific research on the power of quantum computing against modern day encryption would need to be done. There are still only a small amount of companies with quantum computers, the bulk being defense contractors, top governments (U.S.A., China, Russia, Japan, Germany, India, Iran and Israel) and a few private sector focused companies (Google, Microsoft, IBM, etc.) and top research universities that are capable of doing the research. If there is a flaw found in the mathematics used for the current standard encryption algorithms, new algorithms would be created to take their place. As rolling your own crypto has always been bad practice if you did not have the proper mathematics background and work experience as a full-time cryptographer.<p>It may require new hardware or enhancements to hardware to accommodate the changes (e.g. AES instruction sets added to the x86, ARM, SPARC, MIPS, etc. processors) to help speed up the processing of encryption and decryption requests. When that time comes there will be a quick rush from vendors to patch and or upgrade systems when possible.
inpover 7 years ago
A very good ressource: <a href="https:&#x2F;&#x2F;pqcrypto.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;pqcrypto.org&#x2F;</a>
评论 #15774823 未加载
quickthrower2over 7 years ago
My question is what if someone is logging internet traffic right now to crack post-quantum? They&#x27;d have the formidable challenge of deciding what to log of all the stuff ... but spy agencies might be harvesting data for example.<p>Credit card transactions are ok but other secrets maybe not so ok.