Quantum Computing a Threat to Encryption Security
In compliance with the cybersecurity executive order released in January 2022, President Joe Biden issued a memorandum outlining measures to strengthen the cybersecurity of the Department of Defense, Intelligence Community, and domestic surveillance networks.
The memorandum says that the NSA needs to make available quantum-resistant protocols and pl for the use of quantum-resistant cryptography where necessary. QANPlatform’s
Lattice-based post-quantum cryptographic algorithm implemented in Rust programming language secures against quantum computer attacks. QAN uses a proof-of-randomness consensus algorithm, multi-language smart contract development, lattice-based post-quantum cryptographic algorithm, and multi-language smart contract programmed in Rust language.
Johann Polecsak, Co-founder at QANPlatform, said:
"The recent memorandum published by WhiteHouse.gov
on Improving the Cybersecurity of National Security must open everyone's eyes how close the problem really is. The level of denial is still absurdly high related to the topic. Unfortunately, a lot of "semi-experts" misinform and convince the general public that the problem can be easily mitigated in the future. Upgrading already running, non-central decision capable distributed systems (e.g. Blockchains) will be IMPOSSIBLE without making cruel sacrifices to existing wallet holders (like losing funds if not migrating to post-quantum wallets in a given timeframe). Everyone holding any crypto-asset should educate themselves on the issue from credible sources."
What is Quantum computing?
Quantum technology is a form of technology that relies on the concept of quantum mechanics, the physics of sub-atomic particles. This is known as quantum entanglement when two atoms are interconnected or intertwined despite being apart. When you alter one of their attributes, the other modifies as well. As if that wasn’t sufficient, quantum physics states that simply looking at an atom changes its attributes. One idea is to use quantum-protected encryption keys to enhance communication safety. Entangled atoms can be used to identify whether data transmission has been tampered with.
The quantum superposition principle asserts that subatomic particles can exist in several states simultaneously. The Schrodinger’s Cat theoretical question revolves around a cat, a vial of poison, and a radioactive source enclosed in a sealed chamber. When a Geiger detector identifies radiation, the flask is shattered, spilling the poison and killing the cat. Because radioactivity detection is a statistical procedure, the cat could be dead or alive. At the same time, the container is shut, with the verdict only being verified when you open the box and see the animal in either condition.
Quantum computers are the most prominent use of this interpretation of reality. Quantum computers use qubits, which can be one, zero, sometimes at the same time, as opposed to digital computers, which gather data as bits (ones and zeros in binary). This superposition condition opens up a virtually endless number of options, enabling extraordinarily quick parallel and synchronous computations.
Catch all the breaking news, and Don’t forget to like the story!
Disclaimer: The purpose of this article is to remove informational asymmetry existing today in our digital markets by performing due diligence, asking the right questions, and equipping readers with better opinions to make informed decisions. The writer holds Bitcoin, Ethereum, Cardano, Solana and Cosmos. The writer has a vested interest in the story.