TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: If Quantum Computers Destroy Keypair Encryption, What Are Alternatives?

9 点作者 markhenderson超过 7 年前
Every now and again I see an article like this pop up: https:&#x2F;&#x2F;www.technologyreview.com&#x2F;s&#x2F;609408&#x2F;quantum-computers-pose-imminent-threat-to-bitcoin-security&#x2F;<p>Let&#x27;s assume it&#x27;s true. Public &#x2F; Private keypair encryption (via cryptobox) is a big part of the backbone of an app I&#x27;m working on. Is there any way to future proof my crypto in case the Quantum Computers do destroy any security we thought we had?

3 条评论

techjuice超过 7 年前
More scientific research on the power of quantum computing against modern day encryption would need to be done. There are still only a small amount of companies with quantum computers, the bulk being defense contractors, top governments (U.S.A., China, Russia, Japan, Germany, India, Iran and Israel) and a few private sector focused companies (Google, Microsoft, IBM, etc.) and top research universities that are capable of doing the research. If there is a flaw found in the mathematics used for the current standard encryption algorithms, new algorithms would be created to take their place. As rolling your own crypto has always been bad practice if you did not have the proper mathematics background and work experience as a full-time cryptographer.<p>It may require new hardware or enhancements to hardware to accommodate the changes (e.g. AES instruction sets added to the x86, ARM, SPARC, MIPS, etc. processors) to help speed up the processing of encryption and decryption requests. When that time comes there will be a quick rush from vendors to patch and or upgrade systems when possible.
inp超过 7 年前
A very good ressource: <a href="https:&#x2F;&#x2F;pqcrypto.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;pqcrypto.org&#x2F;</a>
评论 #15774823 未加载
quickthrower2超过 7 年前
My question is what if someone is logging internet traffic right now to crack post-quantum? They&#x27;d have the formidable challenge of deciding what to log of all the stuff ... but spy agencies might be harvesting data for example.<p>Credit card transactions are ok but other secrets maybe not so ok.