What comes after public key encryption

When we go browse the Internet, read email or make an online payment, we trust in the encryption working behind the scenes to protect us.

There are two commonly used forms of encryption, RSA asymmetric Public and Private Key and the elliptic curve cryptography (ECC). The RSA cryptosystem uses large prime numbers and ECC is based on discrete logarithms on an elliptic curve.

Both of these encryption techniques are resistant to brute force attack, where an attacker systematically attempts every possible key combination, it is just not feasibly worthwhile to attempt this due to the size of the task.

However, with the quantum algorithms, such as Shor’s, it could be possible in principle to break these two trusted encryption techniques.

Some companies are now starting to provide the frameworks to emulate and prepare for quantum computing, such as Microsoft’s Quantum Development Kit.

Quantum computers are still in development, but the accuracy of them is improving and getting ever closer to their realisation. Quantum computation requires certain resources, such as the number of qubits used and the number of quantum gates.

A cryptologically useful quantum computer would be exponentially faster than classical computers and could break nearly every kind of encryption used to protect banking, medical, business and government records around the world.

Resources