Quantum cryptography ad cybersecurity
to send data across the internet. Quantum key distribution is extremely secure because it is built upon the ability of quantum mechanics to produce true randomness. The encryption key cannot be mathematically broken down even by trial and error such as most of today’s encryptions, which makes the tremendous speed of the quantum computer powerless to such hacks. Once each party has the quantum key, it can be used with any encryption algorithm to encrypt and decrypt any message over any s tandard channel. Today’s efficient long -distance channels all over the world could remain the same and would require no upgrade in security themselves. Lastly, despite quantum computers being many years away, there is information that military and financial organizations are sending now that they would not want to be decrypted by hackers even in fifty years. Therefore, it is vital that quantum encryption is widely used significantly sooner than quantum computers are.
Bibliography
Anthony, S., 2020. Is 14Nm The End Of The Road For Silicon Chips? - Extremetech . [online] ExtremeTech. Available at: http://www.extremetech.com/computing/97469-is-14nm-the-end-of-the-road-for-silicon-lithography [Accessed 10 August 2020] Baumhof, A., 2019. Breaking RSA Encryption – An Update On The State-Of-The-Art . [online] QuintessenceLabs. Available at: https://www.quintessencelabs.com/blog/breaking-rsa-encryption-update-state- art/#:~:text=You%20can%20use%20a%20%E2%80%9Cnormal,RSA%2D2048%20bit%20encryption%20 key [Accessed 14 August 2020] Baumhof, A., 2019. Quantum Leap: Why The Next Wave Of Computers Will Change The World . [online] World Economic Forum. Available at: https://www.weforum.org/agenda/2019/10/quantum-computers-next- frontier-classical-google-ibm-nasa- supremacy/#:~:text=In%201997%2C%20the%20first%20tiny,qubit%20quantum%20computer%20in%2 02007 [Accessed 12 August 2020] Cardinal, D., 2019. How Does Quantum Computing Work? - Extremetech . [online] ExtremeTech. Available at: https://www.extremetech.com/extreme/284306-how-quantum-computing-works [Accessed 10 August 2020] MIT Technology Review. 2019. How A Quantum Computer Could Break 2048-Bit RSA Encryption In 8 Hours . [online] Available at: https://www.technologyreview.com/2019/05/30/65724/how-a-quantum-computer-
could-break-2048-bit-rsa-encryption-in-8-hours/ [Accessed 18 August 2020] Nature.com. 2020. Advanced Photonic Integrated Circuits . [online] Available at: https://www.nature.com/collections/fcppkxtzqf [Accessed 15 August 2020]
Quantum Computers Explained – Limits of Human Technology (2015) YouTube video, added by Kurzgesagt – In a Nutshell [Online]. Available at https://www.youtube.com/watch?v=JhHMJCUmq28 [Accessed 9 August 2020] Quantum Cryptography Explained (2016) YouTube video, added by Physics Girl [Online]. Available at https://www.youtube.com/watch?v=4rRzMeAkULc [Accessed 8 August 2020] Quantumxc.com. 2020. Quantum Cryptography, Explained | Quantumxc . [online] Available at: https://quantumxc.com/quantum-cryptography- explained/#:~:text=Cryptography%20is%20the%20process%20of,way%20that%20cannot%20be%20hac ked [Accessed 16 August 2020] Rotman, D., 2020. We’ re Not Prepared For The End Of Moore’S Law . [online] MIT Technology Review. Available at: https://www.technologyreview.com/2020/02/24/905789/were-not-prepared-for-the-end-of-moores- law/#:~:text=It%20has%20fueled%20prosperity%20of,end%20is%20now%20in%20sight.&text=Gordon %20Moore's%201965%20forecast%20that,of%20the%20last%20half%2Dcentury [Accessed 19 August 2020]
190
Made with FlippingBook Digital Publishing Software