{"id":27385,"date":"2014-11-13T04:44:45","date_gmt":"2014-11-13T09:44:45","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27385"},"modified":"2014-11-13T04:44:45","modified_gmt":"2014-11-13T09:44:45","slug":"how-quantum-computers-will-undermine-cryptography","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/how-quantum-computers-will-undermine-cryptography.php","title":{"rendered":"How quantum computers will undermine cryptography"},"content":{"rendered":"<p><p>    As a result, investment in quantum computing has increased and    the pace of development has accelerated, with companies like    Microsoft and IBM getting on board in recent years. While it    used to be thought that the first functioning quantum computers    would emerge in 2050, it now looks like they may only be 10-20    years away.  <\/p>\n<p>    However, Mr Snow warns that while quantum computers will be a    \"wonderful gift\" for the scientific community, they also pose a    \"monstrous threat\" to the security functions running on the    World Wide Web.  <\/p>\n<p>    \"Every single security function out there is using something    called public-key cryptography. It's a specific set of    algoriths and they all share one common property  they    absolutely spill their guts and fall apart under a quantum    computing attack,\" said Mr Snow.  <\/p>\n<p>    \"So the quantum computer comes to exist, and web security is    dead. Nobody should send any money anywhere over the web    again.\"  <\/p>\n<p>    Mr Snow said this is mainly due to vulnerabilities in the    'border gateway control engines' that transfer data across    national borders. These vulnerabilities are well documented,    and cyber criminals have been exploiting them to steal money    and spy on web users for the past 20 years, but they have never    been fixed because the web is not owned or controlled by any    single entity.  <\/p>\n<p>    The only people with the power to fix the vulnerabilities are    the network administrators that control the border gateway    protocol, but they do not regard data protection as their    problem, as their job is simply to ship data across boundaries     not to store it.  <\/p>\n<p>    \"They don't realise that if the border gateway protocol is    fixed, it would solve a hell of a lot of problems for the    millions of people that are being misdirected on the end points    at their sites because of bad routing decisions that have been    made by attackers,\" said Mr Snow.  <\/p>\n<p>    In the event that these border gateway control engines are    taken down by a quantum computing attack, it could bring down    the entire Web, according to Mr Snow.  <\/p>\n<p>    He pointed to the congressional testimony of Sami Saydjari,    founder and president of the US Cyber Defense Agency, which was    published in 2007 and demonstrated the potential devastation an    incident of this scale could wreak.  <\/p>\n<p>    Mr Saydjari claimed that, with three years preparation and a    budget of $500 million, an attacker could launch a cyber attack    that would take down the US infrastructure for 30 days,    crippling transportation networks, rupturing oil and gas    pipelines with improper control, disrupting financial services    and disabling communications networks.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/telegraph.feedsportal.com\/c\/32726\/f\/567647\/s\/4066a06e\/sc\/1\/l\/0L0Stelegraph0O0Ctechnology0Cnews0C112240A580CHow0Equantum0Ecomputers0Ewill0Eundermine0Ecryptography0Bhtml\/story01.htm\/RK=0\/RS=wemZnRP928sK8iIPVCR19RJJgcs-\" title=\"How quantum computers will undermine cryptography\">How quantum computers will undermine cryptography<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> As a result, investment in quantum computing has increased and the pace of development has accelerated, with companies like Microsoft and IBM getting on board in recent years. While it used to be thought that the first functioning quantum computers would emerge in 2050, it now looks like they may only be 10-20 years away. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-27385","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27385"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27385"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27385\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}