{"id":509,"date":"2015-08-31T03:33:26","date_gmt":"2015-08-31T03:33:26","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=509"},"modified":"2024-12-23T08:02:07","modified_gmt":"2024-12-23T08:02:07","slug":"nsa-wants-encryption-that-fends-off-quantum-computing-hacks","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/nsa-wants-encryption-that-fends-off-quantum-computing-hacks-509\/","title":{"rendered":"NSA wants encryption that fends off quantum computing hacks"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap15.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"  aligncenter wp-image-510\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap15.jpg\" alt=\"NSA wants encryption that fends off quantum computing hacks\" width=\"756\" height=\"470\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap15.jpg 955w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap15-300x187.jpg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/08\/Snap15-2x1.jpg 2w\" sizes=\"auto, (max-width: 756px) 100vw, 756px\" \/><\/a><\/p>\n<p>The National Security Agency isn&#8217;t just yearning for quantum computers that can break tough encryption &#8212; it wants encryption that can protect against quantum computers, too. Officials have begun planning a transition to &#8220;quantum resistant&#8221; encryption that can&#8217;t be cracked as quickly as conventional algorithms. As the NSA explains, even a seemingly exotic technique like elliptic curve cryptography &#8220;is not the long term solution&#8221; people thought it was. Quantum computing is advancing quickly enough that the NSA and other organizations could find themselves extremely vulnerable if they&#8217;re not completely ready when the technology becomes a practical reality.<\/p>\n<p>This doesn&#8217;t mean that the NSA is asking the government or security vendors to avoid upgrading their &#8216;traditional&#8217; encryption. It already has suggestions for cryptographic methods that should make it easier to adopt quantum-proof security. However, the agency doesn&#8217;t want others pouring a lot of their time and money into encryption that may well become obsolete in the &#8220;not too distant future.&#8221; Even though you aren&#8217;t likely to see a wave of quantum hacking any time soon, the prospect is real enough that the NSA is treating it as a high priority.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The National Security Agency isn&#8217;t just yearning for quantum computers that can break tough encryption &#8212; it wants encryption that can protect against quantum computers, too. Officials have begun planning a transition to &#8220;quantum resistant&#8221; encryption that can&#8217;t be cracked as quickly as conventional algorithms. As the NSA explains, even a seemingly exotic technique like &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/nsa-wants-encryption-that-fends-off-quantum-computing-hacks-509\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">NSA wants encryption that fends off quantum computing hacks<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[95,206,205],"class_list":["post-509","post","type-post","status-publish","format-standard","hentry","category-news","tag-nsa","tag-quantum-computers","tag-quantum-computing-hacks"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=509"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/509\/revisions"}],"predecessor-version":[{"id":511,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/509\/revisions\/511"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}