Stealing Secrets with Quantum Physics

Properties of quantum mechanics such as superposition and quantum entanglement have presented new challenges and new opportunities on the horizon for cryptography and information security

“Mathematics is Truth” — RZA, Wu-Tang Clan

Key generation and exchanges used for generating ephemeral encrypted sessions (such as those used in the OpenSSL implementation of TLS) are vulnerable to new types of mathematic attacks from quantum computers
The Diffie-Hellman algorithm. EDH ensures perfect forward secrecy by requiring Alice and Bob to generate X and Y randomly.

Break Glass in Case of Discrete Log

Shor’s Algorithm exploits unique properties within quantum mechanics that could allow hackers to stealthily break encryption protected by the difficulty factoring large prime numbers
Recent advances in quantum computing have brought new forms of encryption that, until recently, were simply tropes in science fiction

Creative Destruction

The dilution refrigeration chamber inside of a quantum computer. Serious structural and scientific barriers still inhibit our ability to easily exploit quantum mechanics in infosec and cryptography, but the science and engineering behind quantum computing has brought quantum cryptography surprisingly close to reach.

Principal PM for Cryptography and Security Products @HashiCorp. Formerly Defense/NatSec & Crypto @NetApp, VC @GGVCapital + @AmplifyPartners

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Bug Heroes Deluxe Hack Free Resources Generator

Airdrops | OLYMPIA x FANPAD Giveaway

My Tech Journal: Day 2 and Day 3

What is SMTP?

Will A Cyber Attack Happen? Why, yes!

WELCOME TO ALTCOIN1000!

$ARC Code edit

Why never online wallet

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Andy Manoske

Andy Manoske

Principal PM for Cryptography and Security Products @HashiCorp. Formerly Defense/NatSec & Crypto @NetApp, VC @GGVCapital + @AmplifyPartners

More from Medium

Curiosities on Quantum Computing — Multi-qubit System

Review: QuTech’s Quantum Inspire

The Hype of Quantum Algorithms

Q-Intro: Grover Iterator