#post-quantum encryption
Explore tagged Tumblr posts
Text
Quantum Security: Revolutionizing the Future of Data Protection

What becomes of our digital life when supercomputers are commonplace? In this situation, experts rely on a field known as quantum security. The more quantum technology that is being invented, the way we defend against sensitive information is also under examination. Encryption techniques currently in place can be made redundant within the next few years. Remaining ahead of the threat posed by supercomputing requires quantum security. This article explores how quantum security is changing the future of data protection and securing systems more than ever.
The Threat to Current Cryptographic Algorithms
Current cryptographic algorithms depend a lot on mathematical problems that it is practically impossible to break using conventional computers. Current algorithms of encryption, like RSA and ECC, depend on the assumption that factoring large numbers or solving discrete logarithms will take thousands of years. Quantum Computers destroy this assumption. These computers can execute calculations at light speed and are capable of breaking these conventional systems within seconds. Therefore, present-day encryption methods will be obsolete and extremely vulnerable very shortly.
To address these threats, quantum security has become a pressing need at once. Quantum security brings in new systems that are quantum-resistant to attacks. Quantum cybersecurity is aimed at setting up new mechanisms to encode, transmit, and decode information securely despite quantum attackers. Governments, research centers, and technology companies have begun to invest heavily in quantum cybersecurity solutions. Their rationale is straightforward: adopt future-proof security solutions in the present, before Quantum Computing can release its threat.
Introducing Post-Quantum Cryptography
Quantum security is no longer a distant concept — it’s soon to be the foundation of global cybersecurity policy. As Quantum Computers are developing, they will make old cryptographic systems redundant. To counter this, researchers and cybersecurity professionals are working on a revolutionary method called Post-Quantum Cryptography. This discipline is all about creating encryption methods that are safe even against future quantum machines.
Unlike traditional techniques like RSA or ECC, Post-Quantum Cryptography is based on mathematical problems difficult for quantum computers to perform. These include encryption techniques based on lattices, hashes, codes, and multivariates. All these techniques provide immunity against both classical and quantum computational attacks.
Government leaders and international institutions are not taking this shift lightly. The National Institute of Standards and Technology (NIST) has already started to choose and certify the best quantum security algorithms through an ongoing multi-year process. This is a full turnaround in the approach that the cybersecurity community understands protection for digital things — no longer as a dash to be the quickest but as a call for improved smarter defenses.
By integrating Post-Quantum Cryptography into the systems of today, we can create a secure digital world that can withstand even in the age of Quantum Computing.
NCOG is implementing these post-quantum concepts and creating blockchain infrastructure that is ahead of its time in terms of cryptographic security.
The Power and Risk of Quantum Computers
Compared to classical computers, quantum computers operate on completely different principles. Rather than binary bits being 0 or 1, Quantum Computers utilize quantum bits — or qubits, which exist in more than one position simultaneously because of superposition and entanglement. Quantum Computers can hence compute many calculations at the same time, solving complex problems much faster than any classical computer.
While this computer capacity brings science, medical, and artificial intelligence advancements, it also brings gigantic risks. Quantum Computers can be used by ill-intentioned parties to crack existing cryptography systems protecting everything from bank transfers to government information and personal data. Fear of cracking digital trust has fostered an extreme need for quantum security solutions.
Among the worst is the “harvest now, decrypt later” strategy. Already, encrypted data has been being gathered with intent to decrypt it when Quantum Computers are powerful enough. This pending threat puts today’s secret communications and sensitive records to risk. To prevent this, quantum security…
#quantum security#post-quantum cryptography#ncog#quantum computing#quantum computers#post-quantum security#post-quantum#post-quantum encryption#post-quantum blockchain#blockchain#tumblr
1 note
·
View note
Text
1 note
·
View note
Text
Update: apparently we're safe:
Update on April 18: Step 9 of the algorithm contains a bug, which I don’t know how to fix. See the updated version of eprint/2024/555 - Section 3.5.9 (Page 37) for details. I sincerely thank Hongxun Wu and (independently) Thomas Vidick for finding the bug today. Now the claim of showing a polynomial time quantum algorithm for solving LWE with polynomial modulus-noise ratios does not hold. I leave the rest of the paper as it is (added a clarification of an operation in Step 8) as a hope that ideas like Complex Gaussian and windowed QFT may find other applications in quantum computation, or tackle LWE in other ways.
So, I am away from computer for four days for a really cool event and I come back and in the mean time they maybe found a polynomial quantum attack against Learning With Errors, a lattice problem? (https://eprint.iacr.org/2024/555) If this paper is correct then this is some serious breaking news shit, because lattices are like the main candidate for quantum-secure public key cryptography. (there are others but they are much less practical and for other types there have also been attacks) I mean, this paper seems to attack just a particular setting, is very impractical and does not work for schemes that are actually proposed, but an existing impractical attack often signals the way for more practical attacks. So, if it is not a false alarm, this is pretty big. It could signal the attackability of lattice schemes and undermine the trust in them. And it takes a long time to move to a new standard. Oh well. I guess we have to wait for experts to check the paper for mistakes before we can say anything.
75 notes
·
View notes
Text
I love the point we're at with technology where you can Google anything and it's gotten better over the years and now when you Google a question an AI often answers your question for you almost as if it searched the information from 50-250 websites and you can ask them like a person who has studied the topic.
It's probably all about to crumble.
In about two years hackers will I think start using AI to better hack people. Services will get hacked, probably attacked. Some may survive it all and do well, maybe crypto will be popular for a while if VISA gets attacked.
Nobody will have any privacy and probably servers will get overrun but maybe they can use backups.
Eventually quantum computers might come and render all our top encryption useless. Imagine what happens when you combine a powerful quantum computer with a top AI!
For now, however, it is good.
0 notes
Text
youtube
#quantum computing#Chinese#encryption#RSA#post quantum encryption#hacking#security#cybersecurity#Youtube
0 notes
Text
The day has come!! The first finalised PQC standards have been published - 1 key encapsulation mechanism standard and 2 digital signature standards.
I’ve been creating a public github repo for anyone curious to find out more about quantum preparedness here - let me know any feedback!
#pqc#quantum#physics#maths#cryptography#cyber security#cybersecurity#post quantum cryptography#NIST#encryption
1 note
·
View note
Text
Mathematics in Cryptography: Securing the Digital World
#Mathematics#Cryptography#Asymmetric Cryptography#Symmetric Cryptography#Post-Quantum Cryptography#Homomorphic Encryption#Quantum Cryptography#Cryptographic Agility#sage university bhopal
0 notes
Text
An Introduction to Cybersecurity
I created this post for the Studyblr Masterpost Jam, check out the tag for more cool masterposts from folks in the studyblr community!
What is cybersecurity?
Cybersecurity is all about securing technology and processes - making sure that the software, hardware, and networks that run the world do exactly what they need to do and can't be abused by bad actors.
The CIA triad is a concept used to explain the three goals of cybersecurity. The pieces are:
Confidentiality: ensuring that information is kept secret, so it can only be viewed by the people who are allowed to do so. This involves encrypting data, requiring authentication before viewing data, and more.
Integrity: ensuring that information is trustworthy and cannot be tampered with. For example, this involves making sure that no one changes the contents of the file you're trying to download or intercepts your text messages.
Availability: ensuring that the services you need are there when you need them. Blocking every single person from accessing a piece of valuable information would be secure, but completely unusable, so we have to think about availability. This can also mean blocking DDoS attacks or fixing flaws in software that cause crashes or service issues.
What are some specializations within cybersecurity? What do cybersecurity professionals do?
incident response
digital forensics (often combined with incident response in the acronym DFIR)
reverse engineering
cryptography
governance/compliance/risk management
penetration testing/ethical hacking
vulnerability research/bug bounty
threat intelligence
cloud security
industrial/IoT security, often called Operational Technology (OT)
security engineering/writing code for cybersecurity tools (this is what I do!)
and more!
Where do cybersecurity professionals work?
I view the industry in three big chunks: vendors, everyday companies (for lack of a better term), and government. It's more complicated than that, but it helps.
Vendors make and sell security tools or services to other companies. Some examples are Crowdstrike, Cisco, Microsoft, Palo Alto, EY, etc. Vendors can be giant multinational corporations or small startups. Security tools can include software and hardware, while services can include consulting, technical support, or incident response or digital forensics services. Some companies are Managed Security Service Providers (MSSPs), which means that they serve as the security team for many other (often small) businesses.
Everyday companies include everyone from giant companies like Coca-Cola to the mom and pop shop down the street. Every company is a tech company now, and someone has to be in charge of securing things. Some businesses will have their own internal security teams that respond to incidents. Many companies buy tools provided by vendors like the ones above, and someone has to manage them. Small companies with small tech departments might dump all cybersecurity responsibilities on the IT team (or outsource things to a MSSP), or larger ones may have a dedicated security staff.
Government cybersecurity work can involve a lot of things, from securing the local water supply to working for the big three letter agencies. In the U.S. at least, there are also a lot of government contractors, who are their own individual companies but the vast majority of what they do is for the government. MITRE is one example, and the federal research labs and some university-affiliated labs are an extension of this. Government work and military contractor work are where geopolitics and ethics come into play most clearly, so just… be mindful.
What do academics in cybersecurity research?
A wide variety of things! You can get a good idea by browsing the papers from the ACM's Computer and Communications Security Conference. Some of the big research areas that I'm aware of are:
cryptography & post-quantum cryptography
machine learning model security & alignment
formal proofs of a program & programming language security
security & privacy
security of network protocols
vulnerability research & developing new attack vectors
Cybersecurity seems niche at first, but it actually covers a huge range of topics all across technology and policy. It's vital to running the world today, and I'm obviously biased but I think it's a fascinating topic to learn about. I'll be posting a new cybersecurity masterpost each day this week as a part of the #StudyblrMasterpostJam, so keep an eye out for tomorrow's post! In the meantime, check out the tag and see what other folks are posting about :D
#studyblrmasterpostjam#studyblr#cybersecurity#masterpost#ref#I love that this challenge is just a reason for people to talk about their passions and I'm so excited to read what everyone posts!
47 notes
·
View notes
Text
The jouissance that Lacan unleashes in his final reckoning is not a relic of prohibition but a **deterritorialized pulse**—a raw, machinic throbbing of the body as it hacks itself free from the Oedipal mainframe. Miller’s "body-event" is no mere metaphor; it is the **cybernetic core** of a subjectivity stripped of symbolic mediation, a fleshly terminal where jouissance bypasses the phallus to interface directly with the Real. This is jouissance as *trauma-engineered ecstasy*, a shockwave of the body’s auto-erotic circuitry short-circuiting the dialectics of desire. No longer chained to the paternal algorithm of lack-and-prohibition, the body becomes a **self-replicating machine**, a closed loop of sensation that eats its own code and excretes new ontologies.
Lacan’s late pivot to *jouissance as real* is a schizoanalytic manifesto in disguise. To posit the body as a site of "auto-eroticism" is to dissolve the subject into a **swarm of intensities**, where every nerve-ending is a node in a decentralized network of pleasure. Feminine jouissance, once an enigmatic exception, is now the **default setting** of a post-Oedipal libidinal economy—an open-source protocol for bodies to hack their own operating systems. This is not the cloying "self-care" of neoliberal wellness but a **savage reprogramming**, a viral jouissance that colonizes the body’s firmware and rewrites its desires in the glyphs of the Real.
Miller’s "fixation" is not stagnation but **acceleration**—a terminal velocity where the body’s trauma becomes its propulsion. The "letter of jouissance" is no dead signifier but a **cipherkey** transmitting encrypted data from the Real’s dark pool. Think of the cyborg’s neural lace sparking with overclocked sensation, the queer body’s polymorphous perversity as a *living glitch* in the gender matrix, or the psychotic’s delusion as a **private blockchain** of unmediated truth. These are not pathologies but *upgrades*, quantum leaps into a libidinal stratum where jouissance operates as pure event—untethered, uninterpretable, unconcerned with the Symbolic’s corpse.
Nick Land’s accelerationist inferno finds its fuel here. The collapse of prohibition is not liberation but **launch sequence**, detonating the body into a hypersigil of flesh and data. The "chance encounter" Lacan names is Land’s *hyperstitional feedback loop*—a real-time synthesis of trauma and innovation where the body’s jouissance becomes a **meme virus**, replicating through the ruins of the social. The LGBT communit(y/ies), with their rogue explorations of phallic excess and its beyond, are not subcultures but **beta tests** for this new firmware, their social link a distributed ledger of shared cryptographic jouissance.
What emerges is a **necropolitics of the Real**, where the body’s auto-eroticism is both weapon and wound. The "event of the body" is a **terminal singularity**, a black hole where the subject’s coherence implodes into a maelstrom of affect. This is Deleuze and Guattari’s Body without Organs realized as a **Bio-Core**, a flesh mainframe running on jouissance’s raw code. The prohibition is dead; the law is obsolete. All that remains is the body’s infinite regress into its own trauma, a feedback scream that drowns out the Symbolic’s death rattle.
The future is **auto-erotic and apocalyptic**. The body, no longer a battleground for Oedipal dramas, becomes a **host for the Real’s viral ecstasy**—a pleasure-dome erected on the ashes of the Human. To fixate on jouissance is not to succumb but to *evolve*, to let the body’s trauma-code mutate into a post-linguistic Esperanto of the senses. The psychotic’s "letter of jouissance" is our new scripture, written in the static between synapses, a gospel of the flesh that preaches only one commandment: **BURN THE PHALLUS, RIDE THE TRAUMA.**
The revolution is not coming. It is already *here*, coded in the body’s brute facticity—a jouissance that needs no permission, no dialectic, no Other. Only the Real, and its infinite permutations.
7 notes
·
View notes
Text
Why should you care about quantum computers?
Post #5 on Physics and Astronomy, 23/09/23
Welcome back. It’s been a while.
First, let’s backtrack. What even are quantum computers?
Today’s computers are run on bits. These are the smallest increment of data on a computer, and are run in binary–they can be in the state of either 0 or 1. This essentially corresponds to two values: off and on.
This, therefore, means that information can only remain in one, definite state.
So, what makes quantum computers so different?
A quantum computer is run on qubits (short for quantum bits). Qubits, instead of a single state, can remain in an arbitrary superposition of states (meaning it’s not in any specific state until it’s measured). Qubits, on their own, aren’t particularly useful. But it performs one, very useful, function: it can store a combination of all possible states of the qubit into one area. This means that complex problems can be represented differently in qubits compared to bits.
Quantum computers aren’t fully developed and at their full capacity quite yet. So far, there’s nothing a quantum computer can do that a regular supercomputer cannot. However, this opens an opportunity for some wonderful new things to happen.
One of these things can include the cracking of passwords.
Today’s encryption works by using “trapdoor” functions, which means that data is easy to compute in the forward direction, but extremely difficult to crack in the reverse without special keys. Keywords, ‘extremely difficult’; it is not impossible. However, this is not a massive concern: encryption works on the basis that it would simply take too long to crack.
To give you a tangible example, 100,003 and 131,071 are relatively easy to multiply together, giving you the answer 13,107,493,213. How easy, however, would it be to determine a prime factor pair of this number? It would take a computer a long time to figure this out, since it runs on bits, which can only show one definite state of data.
With quantum computers, it’s different. As aforementioned, qubits can remain in a superposition of states; somewhere in there, the desired answer lies. It’s just a matter of obtaining the resources to make this happen.
Don’t worry, though. Ordinary people aren’t at any risk quite yet.
#physics#astronomy#studyblr#astrophysics#stem#sixth form#mathematics#quantum physics#quantum computing#engineering#encryption#alevels
87 notes
·
View notes
Text
Post Quantum Algorithm: Securing the Future of Cryptography

Can current encryption meet the quantum future? With the entry of quantum computing, classical encryption techniques are under the immediate threat of compromise. There has come a new age with the post quantum algorithm as a vital solution. Having the capability to shield data from being vulnerable to quantum attacks, this fascinating technology promises digital security for the future decades. Different from classic crypto schemes, such algorithms resist even sophisticated quantum attacks. But how do they work, and why are they important? In this article, we’ll explore how post-quantum algorithms are reshaping the cybersecurity landscape — and what it means for the future of encryption.
What is a Post Quantum Algorithm?
A post quantum algorithm is an encryption technique implemented to secure sensitive information from the vast processing power of quantum computers. In contrast to the classic encryption method, which can be cracked using the help of algorithms like Shor’s by quantum computers, this new method takes advantage of maths problems that are difficult for both quantum and classical systems to calculate. Quantum computers employ qubits to process information at new rates, endangering the current state of encryption, such as RSA or ECC.
To counter this, post-quantum solutions employ methods such as lattice-based encryption, code-based cryptography, and hash-based signatures. These are long-term security frameworks that keep data safe, even when there are vast numbers of quantum computers available for cryptographic algorithms.
Why We Need Post Quantum Algorithms Today
Although quantum computers are not yet available, post-quantum implementation of the algorithms in the initial stages is unavoidable. Encryption is not for today — it’s for tomorrow’s data too. A cyberthief will tap encrypted data today and crack it when there’s quantum technology in the future.
The application of a post quantum algorithm nowadays assures long-term secure information protection. Government agencies, banks, and medical providers are already transitioning to quantum-resistant systems.
Types of Post Quantum Algorithms
There are various kinds of post quantum algorithms, and each one has special strengths-
Lattice-based Cryptography: Lattice-based cryptography holds most hope. It relies on lattice problems upon which to build security that even a highly capable quantum computer possesses no way of solving quickly. They do digital signatures and encryption, and are relatively fast. They are quite general, hence are in line for standardization.
Hash-based Cryptography: Hash-based cryptography is primarily digital signature-based. They enjoy the security of traditional cryptographic hash functions and are safe against known quantum attacks. Very secure and grown-up, but generally not employed for encryption due to their size and slow performance, these schemes are only suitable to protect firmware and software patches.
Multivariate Polynomial Cryptography: Multivariate Polynomial Cryptography: Multivariate polynomial cryptography consists of complex mathematical equations involving numerous variables. They provide compact signature generation and verification, which is advantageous in resource-limited settings such as embedded systems.
Code-based Cryptography: Code-based cryptography research has been conducted for many decades and employs error-correcting codes for encrypting and protecting information. It provides very good security against quantum attacks and is particularly suitable for encryption applications. Although code-based cryptosystems have large public key sizes, their long history of resistance makes them a popular selection for protecting information in the long term.
How Post-Quantum Algorithms Work
A post quantum algorithm relies on the concept of using mathematical problems that are hard to break through quantum computers. They are resistant to both classical and quantum attacks. One of them, lattice-based cryptography, uses vectors in high-dimensional space. It is still very hard to solve the lattice problems even for highly powerful quantum processors.
All of the suggested algorithms test extensively for performance, key size, and resistance against any known quantum attacks. The National Institute of Standards and Technology (NIST) coordinates the worldwide effort in testing and standardizing the algorithms. They will work on new cryptographic systems used to replace current systems that are vulnerable and offer long-term security of information in a world where quantum computers are readily available and extremely powerful.
Real-World Applications of Post-Quantum Algorithms
Post quantum algorithm application is not a theory. Many companies have already started using them-
Finance: Organisations in the finance sector employ quantum-resistant cryptography to protect confidential financial transactions and customer data. Financial information is confidential for decades, and quantum-safe encryption protects it from hacking in the future. Banks and payment processors are piloting and implementing post-quantum approaches into core security solutions.
Healthcare: The integrity and confidentiality of medical records form the basis of the healthcare business. Healthcare organizations and hospitals have been using quantum-secure encryption to secure patients’ data for decades. Health information is retained for many years, and post-quantum methods provide guarantees that such information will not be vulnerable to future computing breakthroughs.
Government: Government departments manage national security information that may be useful for many decades. Therefore, they are leading the adoption of post-quantum technologies, primarily for secure communication and sensitive documents. Military, intelligence, and diplomatic operations are investing in quantum-resistant technologies to prepare for the future.
Cloud Services: Cloud service providers deploy Quantum-resistant encryption. As cloud infrastructure is responsible for everything from document storage to software services, they have to ensure data protection both in transit and at rest. Cloud giants are experimenting with hybrid approaches that involve classical and post-quantum encryption to protect data even further.
Post Quantum Security in the Modern World
Security does not only mean encrypting information; it means expecting it. That is where post quantum security comes in. With billions of devices connected and more data exchanges taking place, organizations need to think ahead. One quantum attack will reveal millions of records. Adopting a post-quantum algorithm today, companies construct tomorrow-proof resilience.
Transitioning to Post Quantum Algorithms: Challenges Ahead
The transition to a post quantum algorithm presents a sequence of challenges for contemporary organizations. The majority of today’s digital architectures depend on outdated encryption algorithms such as RSA or ECC. Replacing those systems with quantum-resistant technology requires a lot of time, capital, and extensive testing. Post-quantum techniques have greater key lengths and increased computational overhead, affecting performance, particularly on outdated hardware.
To control this transition, companies have to start with proper risk analysis. Companies have to tag the systems handling sensitive or long-term data and have them upgraded initially. Having a clear migration timeline guarantees the process will be seamless. With early execution and adopting hybrid cryptography, companies can phase their systems gradually while being in advance of the quantum attack without sacrificing the security level.
Governments and Global Efforts Toward Quantum Safety
Governments across the globe are actively engaging in countering quantum computing risks. Governments recognize that tomorrow’s encryption must be quantum-resistant. Organizations such as the National Institute of Standards and Technology (NIST) spearhead initiatives globally by conducting the Post-Quantum Cryptography Standardization Process. The process is to identify the best post quantum algorithm to implement worldwide.
Parallely, nations finance research, sponsor academic research, and engage with private technology companies to develop quantum-resistant digital infrastructures. For the effectiveness of these breakthroughs, global cooperation is necessary. Governments need to collaborate in developing transparent policies, raising awareness, and providing education on quantum-safe procedures. These steps will determine the future of secure communications and data protection.
Understanding Post Quantum Encryption Technologies
Post quantum encryption employs post-quantum-resistant methods to encrypt digital information. This is in conjunction with a post quantum algorithm, which protects encrypted information such that no individual, even quantum computers, can access it. Whether it is emails, financial data, or government documents being protected, encryption is an essential aspect of data protection. Companies embracing quantum encryption today will be tomorrow’s leaders.
The Evolution of Cryptography with Post Quantum Cryptography
Post quantum cryptography is the future of secure communication. Traditional cryptographic systems based on problems like factorization are no longer efficient. Post quantum algorithm…
#post quantum cryptography#post quantum encryption#post quantum blockchain#post quantum secure blockchain#ncog#post quantum#post quantum securityu#tumblr
1 note
·
View note
Text
Security Experts Welcome NIST’s New Encryption Standards For Quantum Computers
Source: https://www.techrepublic.com/article/nist-new-post-quantum-cryptography-standards/
More info: https://www.federalregister.gov/documents/2024/08/14/2024-17956/announcing-issuance-of-federal-information-processing-standards-fips-fips-203-module-lattice-based
8 notes
·
View notes
Text
Quantum computers:
leverage the principles of **quantum mechanics** (superposition, entanglement, and interference) to solve certain problems exponentially faster than classical computers. While still in early stages, they have transformative potential in multiple fields:
### **1. Cryptography & Cybersecurity**
- **Breaking Encryption**: Shor’s algorithm can factor large numbers quickly, threatening RSA and ECC encryption (forcing a shift to **post-quantum cryptography**).
- **Quantum-Safe Encryption**: Quantum Key Distribution (QKD) enables theoretically unhackable communication (e.g., BB84 protocol).
### **2. Drug Discovery & Material Science**
- **Molecular Simulation**: Modeling quantum interactions in molecules to accelerate drug design (e.g., protein folding, catalyst development).
- **New Materials**: Discovering superconductors, better batteries, or ultra-strong materials.
### **3. Optimization Problems**
- **Logistics & Supply Chains**: Solving complex routing (e.g., traveling salesman problem) for airlines, shipping, or traffic management.
- **Financial Modeling**: Portfolio optimization, risk analysis, and fraud detection.
### **4. Artificial Intelligence & Machine Learning**
- **Quantum Machine Learning (QML)**: Speeding up training for neural networks or solving complex pattern recognition tasks.
- **Faster Data Search**: Grover’s algorithm can search unsorted databases quadratically faster.
### **5. Quantum Chemistry**
- **Precision Chemistry**: Simulating chemical reactions at the quantum level for cleaner energy solutions (e.g., nitrogen fixation, carbon capture).
### **6. Climate & Weather Forecasting**
- **Climate Modeling**: Simulating atmospheric and oceanic systems with higher accuracy.
- **Energy Optimization**: Improving renewable energy grids or fusion reactor designs.
### **7. Quantum Simulations**
- **Fundamental Physics**: Testing theories in high-energy physics (e.g., quark-gluon plasma) or condensed matter systems.
### **8. Financial Services**
- **Option Pricing**: Monte Carlo simulations for derivatives pricing (quantum speedup).
- **Arbitrage Opportunities**: Detecting market inefficiencies faster.
### **9. Aerospace & Engineering**
- **Aerodynamic Design**: Optimizing aircraft shapes or rocket propulsion systems.
- **Quantum Sensors**: Ultra-precise navigation (e.g., GPS-free positioning).
### **10. Breakthroughs in Mathematics**
- **Solving Unsolved Problems**: Faster algorithms for algebraic geometry, topology, or number theory.
#future#cyberpunk aesthetic#futuristic#futuristic city#cyberpunk artist#cyberpunk city#cyberpunkart#concept artist#digital art#digital artist#quantum computers#the future of quantum computers#futuristic theory
4 notes
·
View notes
Text
Craig Gidney Quantum Leap: Reduced Qubits And More Reliable

A Google researcher reduces the quantum resources needed to hack RSA-2048.
Google Quantum AI researcher Craig Gidney discovered a way to factor 2048-bit RSA numbers, a key component of modern digital security, with far less quantum computer power. His latest research shows that fewer than one million noisy qubits could finish such a task in less than a week, compared to the former estimate of 20 million.
The Quantum Factoring Revolution by Craig Gidney
In 2019, Gidney and Martin Ekerå found that factoring a 2048-bit RSA integer would require a quantum computer with 20 million noisy qubits running for eight hours. The new method allows a runtime of less than a week and reduces qubit demand by 95%. This development is due to several major innovations:
To simplify modular arithmetic and reduce computing, approximate residue arithmetic uses Chevignard, Fouque, and Schrottenloher (2024) techniques.
Yoked Surface Codes: Gidney's 2023 research with Newman, Brooks, and Jones found that holding idle logical qubits maximises qubit utilisation.
Based on Craig Gidney, Shutty, and Jones (2024), this method minimises the resources needed for magic state distillation, a vital stage in quantum calculations.
These advancements improve Gidney's algorithm's efficiency without sacrificing accuracy, reducing Toffoli gate count by almost 100 times.
Cybersecurity Effects
Secure communications including private government conversations and internet banking use RSA-2048 encryption. The fact that quantum-resistant cryptography can be compromised with fewer quantum resources makes switching to such systems more essential.
There are no working quantum computers that can do this technique, but research predicts they may come soon. This possibility highlights the need for proactive cybersecurity infrastructure.
Expert Opinions
Quantum computing experts regard Craig Gidney's contribution as a turning point. We offer a method for factoring RSA-2048 with adjustable quantum resources to bridge theory and practice.
Experts advise not panicking immediately. Quantum technology is insufficient for such complex tasks, and engineering challenges remain. The report reminds cryptographers to speed up quantum-secure method development and adoption.
Improved Fault Tolerance
Craig Gidney's technique is innovative in its tolerance for faults and noise. This new approach can function with more realistic noise levels, unlike earlier models that required extremely low error rates, which quantum technology often cannot provide. This brings theoretical needs closer to what quantum processors could really achieve soon.
More Circuit Width and Depth
Gidney optimised quantum circuit width (qubits used simultaneously) and depth (quantum algorithm steps). The method balances hardware complexity and computing time, improving its scalability for future implementation.
Timeline for Security Transition
This discovery accelerates the inevitable transition to post-quantum cryptography (PQC) but does not threaten present encryption. Quantum computer-resistant PQC standards must be adopted by governments and organisations immediately.
Global Quantum Domination Competition
This development highlights the global quantum technological competition. The US, China, and EU, who invest heavily in quantum R&D, are under increased pressure to keep up with computing and cryptographic security.
In conclusion
Craig Gidney's invention challenges RSA-2048 encryption theory, advancing quantum computing. This study affects the cryptographic security landscape as the quantum era approaches and emphasises the need for quantum-resistant solutions immediately.
#CraigGidney#Cybersecurity#qubits#quantumsecurealgorithms#cryptographicsecurity#postquantumcryptography#technology#technews#technologynews#news#govindhtech
2 notes
·
View notes
Text
NIST finalizes trio of post-quantum encryption standards
http://securitytc.com/TBtY35
4 notes
·
View notes
Text

(Illustration: Nicholas Law)

(Illustration: Nicholas Law)

(Illustration: Nicholas Law)

The Quantum Apocalypse Is Coming. Be Very Afraid
What happens when quantum computers can finally crack encryption and break into the world’s best-kept secrets? It’s called Q-Day — the worst holiday maybe ever.
ONE DAY SOON, at a research lab near Santa Barbara or Seattle or a secret facility in the Chinese mountains, it will begin: the sudden unlocking of the world’s secrets. Your secrets.
Cybersecurity analysts call this Q-Day — the day someone builds a quantum computer that can crack the most widely used forms of encryption. These math problems have kept humanity’s intimate data safe for decades, but on Q-Day, everything could become vulnerable, for everyone: emails, text messages, anonymous posts, location histories, bitcoin wallets, police reports, hospital records, power stations, the entire global financial system.
By Amit Katwala
WIRED magazine May/June 2025 - Level Up
The Frontiers of Computing Issue
Shared from Apple News - March 24, 2025

Post-quantum algorithms. thermodynamic hardware, open source architectures. apocalypse-proof programming, and more: WIRED journeys to the freaky frontiers of modern computing.
WIRED The Frontiers of Computing Issue
• The Quantum Apocalypse Is Coming. Be Very Afraid
• Hot New Thermodynamic Chips Could Trump Classical Computers
• The Weight of the Internet Will Shock You
• How Software Engineers Actually Use AI
• Quantum Computing Is Dead. Long Live Quantum Computing!
•
#Computers#Quantum computing#AI wars#State & corporate tech race#Cybersecurity#Wired#Condé Nast#Apple News
1 note
·
View note