{"id":11941,"date":"2019-07-09T14:07:50","date_gmt":"2019-07-09T13:07:50","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11941"},"modified":"2020-01-02T11:22:02","modified_gmt":"2020-01-02T10:22:02","slug":"post-quantum-cryptography","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/","title":{"rendered":"Status of post-quantum cryptography"},"content":{"rendered":"<p><em>Quantum computers have given rise to a raft of hopes and fears. Their computing capabilities could enable us to <strong>solve certain problems more quickly than today&#8217;s computers<\/strong>, including those upon which modern cryptography is based. Does this mean that the advent of quantum computing will mark the end of cryptography as we know it? And, if so, what contribution can <strong>post-quantum cryptography<\/strong> bring to this new paradigm?<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>The quantum computer is slowly becoming a reality<\/h2>\n<p>The field of quantum computing has seen many advances since the early research of the 1980s\u2014especially that of Richard Feynman<a href=\"#_edn1\" name=\"_ednref1\">[i]<\/a>, and the emergence of the first <strong>quantum algorithms<\/strong> in the 1990s. The first prototype <strong>quantum computers<\/strong> appeared in the 2000s and, since the beginning of the 2010s, there has been <strong>a proliferation of substantive and encouraging announcements<\/strong> in the area. These include D-Wave Systems\u2019s launch of the first commercial quantum computer<a href=\"#_edn2\" name=\"_ednref2\">[ii]<\/a>, IBM\u2019s development of a cloud-based quantum machine<a href=\"#_edn3\" name=\"_ednref3\">[iii]<\/a>, and Google&#8217;s recent announcement on its new quantum processor<a href=\"#_edn4\" name=\"_ednref4\">[iv]<\/a>. On a European scale, there has also been the launch of Atos\u2019s quantum simulator,<a href=\"#_edn5\" name=\"_ednref5\">[v]<\/a> which can test and optimize quantum algorithms for use in real conditions.<\/p>\n<p>As we\u2019ve discussed in a previous article<a href=\"#_edn6\" name=\"_ednref6\">[vi]<\/a>, the fundamental difference between conventional and quantum computers is that traditional machines work on a series of bits whose value is equal to 1 or 0, while quantum computers work on qubits whose value corresponds to a <strong>superposition of states<a href=\"#_edn7\" name=\"_ednref7\">[vii]<\/a><\/strong>. For a given problem, it\u2019s sometimes possible to write a quantum algorithm which\u2014by making use of this <strong>superposition of states<\/strong> and the <strong>quantum entanglement<a href=\"#_edn8\" name=\"_ednref8\">[viii]<\/a><\/strong> principle\u2014can solve it <strong>more quickly than a conventional algorithm<\/strong>. Since such quantum acceleration can only be applied to a limited set of problems (i.e. those for which it&#8217;s possible to write a quantum algorithm) it\u2019s likely that, in the future, quantum computers will be used in addition to\u2014rather than in place of\u2014conventional computers.<\/p>\n<p><strong>Today&#8217;s quantum computers have only a very small capacity<\/strong>. Google&#8217;s quantum processor is rated at 72-qubits, while Intel recently announced the development of a 49-qubit quantum processor<a href=\"#_edn9\" name=\"_ednref9\">[ix]<\/a>. As an illustration, Google estimates that <strong>the number of qubits needed for a real application is between one and ten million<\/strong>. The main difficulty in designing a larger quantum computer lies in the fact that all external interactions induce the phenomenon of <strong>quantum decoherence<\/strong>\u2014which means that the <strong>quantum entanglement<\/strong> it needs to operate can\u2019t be maintained<a href=\"#_edn10\" name=\"_ednref10\">[x]<\/a>. The higher the number of qubits, the more difficult it is to maintain the state of coherence. Doing so requires the system to be isolated at very low temperatures. In view of the current state of development, and the challenges still to be overcome, we may still be a long way from quantum computers being used in any practical application.<\/p>\n<p>&nbsp;<\/p>\n<h2>Classical cryptography\u2019s applications<\/h2>\n<p>To understand the implications of quantum computers for cryptography, we first need to understand the principles of classical cryptography\u2014and its applications.<\/p>\n<p>Classical cryptography involves several different types of algorithms:<\/p>\n<ul>\n<li><strong>Asymmetric (or public-key) cryptography<\/strong>, which is used to establish an encrypted channel between two parties for authentication or electronic-signature purposes (examples are: Diffie-Hellmann, RSA, and elliptic-curve cryptography). Asymmetric cryptography is usually based on <strong>integer factorization<\/strong> or <strong>discrete logarithm<\/strong><\/li>\n<li><strong>Symmetric<\/strong> <strong>(or secret-key) cryptography<\/strong>, which can be used for the effective encryption of data, especially when an encrypted channel has previously been established using asymmetric algorithms (examples are AES and DES). Symmetric cryptography is based on the principles of diffusion and confusion.<\/li>\n<li><strong>Hash functions<\/strong>, which are used to verify the integrity of a file or electronic certificate (examples are MD5 and SHA-2). Hash functions rely on the avalanche effect, which causes each output bit to depend on each input bit.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>How might quantum computers change the game?<\/h2>\n<p>Among the best-known and oldest quantum <strong>algorithms is Shor&#8217;s algorithm<a href=\"#_edn11\" name=\"_ednref11\">[xi]<\/a><\/strong> which can effectively <strong>factorize integers<\/strong> and solve <strong>discrete logarithm<\/strong> problems. Come the day we\u2019re able to construct a quantum computer powerful enough to handle very large numbers using Shor&#8217;s algorithm, <strong>all public-key cryptography based on these problems will be rendered immediately obsolete<\/strong>.<\/p>\n<p>Another well-known quantum algorithm is <strong>Grover&#8217;s algorithm<a href=\"#_edn12\" name=\"_ednref12\">[xii]<\/a><\/strong>, which enables the <strong>inversion of functions.<\/strong> This algorithm can be applied to search effectively for items in an unordered list or unstructured database, something that can be likened to <strong>looking for a needle in a haystack<\/strong>. Grover&#8217;s algorithm thus makes it possible <strong>to accelerate a search for a symmetric encryption key<\/strong> but does not call into question the principles of secret-key cryptography.<\/p>\n<p>&nbsp;<\/p>\n<h2>Post-quantum cryptography<\/h2>\n<p><strong>Post-quantum cryptography<\/strong> refers to cryptographic algorithms that do not rely on problems which can be solved more rapidly by a quantum computer. <strong>Such algorithms won\u2019t be threatened<\/strong> by the advent of\u2014still hypothetical\u2014quantum computers. It should not be confused with <strong>quantum cryptography<\/strong>, which is a form of cryptography that makes use of quantum phenomena to achieve its ends. The challenges associated with post-quantum cryptography are twofold:<\/p>\n<ul>\n<li><strong>To establish a new form of public-key cryptography<\/strong> that doesn\u2019t rely on solving integer factorization or discrete logarithm problems;<\/li>\n<li><strong>To strengthen secret-key cryptography<\/strong>\u2014to make it resilient to the key-finding capabilities of quantum computers.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Public-key cryptography<\/strong> <strong>will have to be redesigned entirely<\/strong> using new cryptographic systems that are based on, for example, error-correcting codes or Euclidean networks<a href=\"#_edn13\" name=\"_ednref13\">[xiii]<\/a>. While numerous theoretical solutions exist, <strong>much research is still needed<\/strong> to turn these into concrete options. There are <strong>several initiatives designed to stimulate research<\/strong> in the area. Examples are the <strong>PQCrypto<\/strong> conference series<a href=\"#_edn14\" name=\"_ednref14\">[xiv]<\/a>, which has been running for over ten years, and the evaluation process recently put in place by <strong>NIST<\/strong>, which aims to <strong>standardize one, or more, post-quantum cryptographic algorithms<\/strong><a href=\"#_edn15\" name=\"_ednref15\">[xv]<\/a>.<\/p>\n<p><strong>Secret-key cryptography is expected to prove robust in a post-quantum world<\/strong>\u2014provided that the length of keys used is sufficient. <strong>Doubling the key size<\/strong> provides an adequate measure of security against quantum computers<a href=\"#_edn16\" name=\"_ednref16\">[xvi]<\/a>. For example, the <strong>AES<\/strong> encryption algorithm <strong>will be less secure, but<\/strong> <strong>could still be used with a 256-bit key<\/strong>. The security of protocols like Kerberos, which are based on these algorithms, doesn\u2019t need to be fundamentally questioned.<\/p>\n<p>And when it comes to hash functions, quantum algorithms don\u2019t appear to find collisions more quickly than conventional algorithms<a href=\"#_edn17\" name=\"_ednref17\">[xvii]<\/a>. <strong>Hash functions will therefore remain secure in a post-quantum world<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Quantum computing remains a distant threat<\/h2>\n<p>The advent of a quantum computer with sufficient capacity to pose <strong>a threat to classical cryptography is still a long way off<\/strong>. Between now and then, we can expect research into post-quantum cryptography to have advanced considerably, and that the changes needed in cryptographic constructions will have been widely anticipated.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[i]<\/a> <a href=\"https:\/\/people.eecs.berkeley.edu\/~christos\/classics\/Feynman.pdf\">https:\/\/people.eecs.berkeley.edu\/~christos\/classics\/Feynman.pdf<\/a><\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[ii]<\/a> <a href=\"https:\/\/phys.org\/news\/2011-06-d-wave-commercial-quantum.html\">https:\/\/phys.org\/news\/2011-06-d-wave-commercial-quantum.html<\/a><\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[iii]<\/a> <a href=\"https:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/49661.wss\">https:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/49661.wss<\/a><\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\">[iv]<\/a> <a href=\"https:\/\/research.googleblog.com\/2018\/03\/a-preview-of-bristlecone-googles-new.html\">https:\/\/research.googleblog.com\/2018\/03\/a-preview-of-bristlecone-googles-new.html<\/a><\/p>\n<p><a href=\"#_ednref5\" name=\"_edn5\">[v]<\/a> <a href=\"https:\/\/atos.net\/fr\/2017\/communiques-de-presse\/communiques-generaux_2017_07_04\/atos-lance-aujourdhui-le-simulateur-quantique-le-plus-performant-au-monde\">https:\/\/atos.net\/fr\/2017\/communiques-de-presse\/communiques-generaux_2017_07_04\/atos-lance-aujourdhui-le-simulateur-quantique-le-plus-performant-au-monde<\/a><\/p>\n<p><a href=\"#_ednref6\" name=\"_edn6\">[vi]<\/a> <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/06\/informatique-quantique-securite\/\">https:\/\/www.riskinsight-wavestone.com\/2017\/06\/informatique-quantique-securite\/<\/a><a href=\"#_ednref7\" name=\"_edn7\"><\/a><\/p>\n<p>[vii] <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_superposition\">https:\/\/en.wikipedia.org\/wiki\/Quantum_superposition<\/a><\/p>\n<p><a href=\"#_ednref8\" name=\"_edn8\">[viii]<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_entanglement\">https:\/\/en.wikipedia.org\/wiki\/Quantum_entanglement<\/a><\/p>\n<p><a href=\"#_ednref9\" name=\"_edn9\">[ix]<\/a> <a href=\"https:\/\/newsroom.intel.com\/news\/intel-advances-quantum-neuromorphic-computing-research\/\">https:\/\/newsroom.intel.com\/news\/intel-advances-quantum-neuromorphic-computing-research<\/a><\/p>\n<p><a href=\"#_ednref10\" name=\"_edn10\">[x]<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_computing#Quantum_decoherence\">https:\/\/en.wikipedia.org\/wiki\/Quantum_computing#Quantum_decoherence<\/a><\/p>\n<p><a href=\"#_ednref11\" name=\"_edn11\">[xi]<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shor's_algorithm\">https:\/\/en.wikipedia.org\/wiki\/Shor%27s_algorithm<\/a><\/p>\n<p><a href=\"#_ednref12\" name=\"_edn12\">[xii]<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Grover's_algorithm\">https:\/\/en.wikipedia.org\/wiki\/Grover%27s_algorithm<\/a><\/p>\n<p><a href=\"#_ednref13\" name=\"_edn13\">[xiii]<\/a> <a href=\"https:\/\/www.springer.com\/fr\/book\/9783540887010\">https:\/\/www.springer.com\/fr\/book\/9783540887010<\/a><\/p>\n<p><a href=\"#_ednref14\" name=\"_edn14\">[xiv]<\/a> <a href=\"https:\/\/pqcrypto.org\/\">https:\/\/pqcrypto.org\/<\/a><\/p>\n<p><a href=\"#_ednref15\" name=\"_edn15\">[xv]<\/a> <a href=\"https:\/\/csrc.nist.gov\/events\/2018\/first-pqc-standardization-conference\">https:\/\/csrc.nist.gov\/events\/2018\/first-pqc-standardization-conference<\/a><\/p>\n<p><a href=\"#_ednref16\" name=\"_edn16\">[xvi]<\/a> <a href=\"http:\/\/cr.yp.to\/codes\/grovercode-20100303.pdf\">http:\/\/cr.yp.to\/codes\/grovercode-20100303.pdf<\/a><\/p>\n<p><a href=\"#_ednref17\" name=\"_edn17\">[xvii]<\/a> <a href=\"https:\/\/cr.yp.to\/hash\/collisioncost-20090517.pdf\">https:\/\/cr.yp.to\/hash\/collisioncost-20090517.pdf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quantum computers have given rise to a raft of hopes and fears. Their computing capabilities could enable us to solve certain problems more quickly than today&#8217;s computers, including those upon which modern cryptography is based. Does this mean that the&#8230;<\/p>\n","protected":false},"author":1264,"featured_media":10813,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,2777],"tags":[],"coauthors":[2741],"class_list":["post-11941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-cybersecurity-digital-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Status of post-quantum cryptography - RiskInsight<\/title>\n<meta name=\"description\" content=\"Quantum computers have given rise to a raft of hopes and fears. Their capabilities could enable us to solve certain problems more quickly (e.g. crypgraphy).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Status of post-quantum cryptography - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Quantum computers have given rise to a raft of hopes and fears. Their capabilities could enable us to solve certain problems more quickly (e.g. crypgraphy).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-09T13:07:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T10:22:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/05\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"4124\" \/>\n\t<meta property=\"og:image:height\" content=\"2902\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Renty\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Renty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/\"},\"author\":{\"name\":\"David Renty\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0534e7c3aa71f805ffd5bc0f82fb26bd\"},\"headline\":\"Status of post-quantum cryptography\",\"datePublished\":\"2019-07-09T13:07:50+00:00\",\"dateModified\":\"2020-01-02T10:22:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/\"},\"wordCount\":1266,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/05\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg\",\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/\",\"name\":\"Status of post-quantum cryptography - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/05\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg\",\"datePublished\":\"2019-07-09T13:07:50+00:00\",\"dateModified\":\"2020-01-02T10:22:02+00:00\",\"description\":\"Quantum computers have given rise to a raft of hopes and fears. Their capabilities could enable us to solve certain problems more quickly (e.g. crypgraphy).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/05\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/05\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg\",\"width\":4124,\"height\":2902,\"caption\":\"Print\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Status of post-quantum cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0534e7c3aa71f805ffd5bc0f82fb26bd\",\"name\":\"David Renty\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/david-renty\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Status of post-quantum cryptography - RiskInsight","description":"Quantum computers have given rise to a raft of hopes and fears. Their capabilities could enable us to solve certain problems more quickly (e.g. crypgraphy).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"Status of post-quantum cryptography - RiskInsight","og_description":"Quantum computers have given rise to a raft of hopes and fears. Their capabilities could enable us to solve certain problems more quickly (e.g. crypgraphy).","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/","og_site_name":"RiskInsight","article_published_time":"2019-07-09T13:07:50+00:00","article_modified_time":"2020-01-02T10:22:02+00:00","og_image":[{"width":4124,"height":2902,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/05\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg","type":"image\/jpeg"}],"author":"David Renty","twitter_misc":{"Written by":"David Renty","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/"},"author":{"name":"David Renty","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0534e7c3aa71f805ffd5bc0f82fb26bd"},"headline":"Status of post-quantum cryptography","datePublished":"2019-07-09T13:07:50+00:00","dateModified":"2020-01-02T10:22:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/"},"wordCount":1266,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/05\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg","articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/","name":"Status of post-quantum cryptography - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/05\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg","datePublished":"2019-07-09T13:07:50+00:00","dateModified":"2020-01-02T10:22:02+00:00","description":"Quantum computers have given rise to a raft of hopes and fears. Their capabilities could enable us to solve certain problems more quickly (e.g. crypgraphy).","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/05\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/05\/Fotolia_69519539_Subscription_Monthly_XXL-CUT-Flat-style-vector-illustration-brainstorming-process-concept-Sentavio.jpg","width":4124,"height":2902,"caption":"Print"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/post-quantum-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Status of post-quantum cryptography"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0534e7c3aa71f805ffd5bc0f82fb26bd","name":"David Renty","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/david-renty\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11941"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11941\/revisions"}],"predecessor-version":[{"id":11969,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11941\/revisions\/11969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/10813"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11941"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}