c04

PQC_for_Dummies

IN THIS CHAPTER A stitch in time saves nine ................................................................................................................................................ Don’t put all your eggs in one basket ................................................................................................................................................ You don’t have to re-invent the wheel ................................................................................................................................................ Chapter 4 Be Prepared Quantum computers are a hot topic in the research community today. While the existing experimental quantum computers can demonstrate the ability to threaten widely used cryptography, they are mostly still laboratory experiments. Eventually, quantum computers will cease to be experimental and become powerful enough to tackle real-world problems. To paraphrase a famous Danish proverb — often attributed to quantum physicist Niels Bohr — predictions are notoriously difficult, especially when they concern the future. Nonetheless, experts in the field of quantum cryptography foresee the availability of useful quantum computers in approximately 2030. This seems still quite a while away today; however it is important to be prepared for a time in which the cryptography widely used today can be attacked very easily. In this chapter we explain the necessity to start preparing now and we show two concrete approaches that you can follow to harden your solution against attacks by quantum computers. Why You Need to Act Sooner Rather Than Later Currently it is not yet foreseeable when sufficiently large and efficient quantum computers will be operational. It is not even guaranteed that all technical problems in the construction of quantum computers can be solved. However, physicists are quite optimistic that the technical problems eventually will be solved. Depending on the data that needs to be protected, it might not be sufficient to wait with the deployment of post-quantum cryptography until quantum computers actually are operational.


PQC_for_Dummies
To see the actual publication please follow the link above