False
Download Learnerz IAS app from the Play Store now! Download

$show=search/label/May%202022

 


Quantum Computing & Computer Security UPSC NOTE

 


Impact of quantum computing on computer security

  • There has been a lot of worry about quantum computing and its potential impact on computer security.

  • Governments and organisations across the world are rushing to develop quantum computing platforms and advanced security algorithms to defend against such machines.

  • One prominent example of the latter is the U.S. National Institute of Standards and Technology’s Post-Quantum Cryptography Standardisation project.

  • Much of our current security is based on techniques such as RSA, elliptic curves, Diffie-Hellman key exchange and almost all of them rely on a few “hard” mathematical problems, such as factorisation and the discrete logarithm problem. 

  • Unfortunately, in 1994, Peter Shor developed a quantum algorithm that (with certain modifications) can break all of these with ease.

  • Lov Grover’s quantum algorithm, often be fixed by increasing the key or password lengths.

  • Fortunately, some common “symmetric” security algorithms such as AES are not badly affected. (Symmetric key algorithms use the same password to lock and unlock the information.)

Steps taken

Post-quantum cryptography:

  • Post-quantum cryptography involves exploring alternative techniques to counter vulnerabilities against quantum attacks. 

  • This need is more pressing than it initially sounds because attackers often record messages in case they can break them later. 

  • While Shor’s algorithm poses particular concerns for certain methods, the field has rapidly evolved with promising approaches such as lattice algebra, multivariate cryptography, isogeny-based techniques, and code-based cryptography.

COMMENTS

Name

Amritsar,1,April 2024,301,Art & Culture,1,August 2023,251,Courses,7,Daily Current Affairs,48,December 2023,189,Disaster Management,2,Environment and Ecology,202,February 2024,228,Foundation Course,1,GDP,1,GEMS Club,1,GEMS Plus,1,Geography,210,Govt Schemes,2,GS 2,1,GS1,6,GS2,76,GS3,30,GST,1,History,11,Home,3,IAS Booklist,1,Important News,71,Indian Economy,185,Indian History,10,Indian Polity,215,International Organisation,12,International Relations,150,Invasive Plant,1,January 2024,240,July 2023,281,July 2024,317,June 2022,6,June 2023,268,June 2024,324,March 2024,238,May 2022,17,May 2024,330,Mentorship,2,November 2023,169,October 2023,203,Places in News,2,Science & Technology,152,Science and Technology,96,September 2023,205,UPSC CSE,111,
ltr
item
Learnerz IAS | Concept oriented UPSC Classes in Malayalam: Quantum Computing & Computer Security UPSC NOTE
Quantum Computing & Computer Security UPSC NOTE
Learnerz IAS | Concept oriented UPSC Classes in Malayalam
https://www.learnerz.in/2023/08/quantum-computing-computer-security.html
https://www.learnerz.in/
https://www.learnerz.in/
https://www.learnerz.in/2023/08/quantum-computing-computer-security.html
true
4761292069385420868
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content