Description
Quantum computers have the potential to break many of the cryptographic algorithms that are currently used to secure communications and protect data. This is because quantum computers can perform certain computations much faster than classical computers, which allows them to solve problems that are considered difficult or infeasible for classical computers.
Some cryptographic algorithms that are not quantum-safe include:
- Symmetric key algorithms such as AES and DES
- Public key algorithms such as RSA and DSA
- Hash functions such as MD5 and SHA-1
- These algorithms are vulnerable to attacks by quantum computers because they rely on the difficulty of certain mathematical problems, such as factoring large numbers or computing discrete logarithms, which can be solved more efficiently by quantum computers.
On the other hand, some cryptographic algorithms are believed to be quantum-safe because they are based on mathematical problems that are believed to be difficult for quantum computers to solve. These algorithms include:
- Symmetric key algorithms such as the New Hope algorithm
- Public key algorithms such as lattice-based cryptography (e.g. NTRU) and post-quantum elliptic curve cryptography (e.g. XMSS)
- Hash functions such as SHA-3 and the Keccak function
It is important to note that the security of these quantum-safe algorithms is still being researched and is not yet fully understood. Some of these algorithms may eventually be broken by advances in quantum computing or by new attacks that have not yet been discovered.
In summary, some cryptographic algorithms are quantum-safe because they are based on mathematical problems that are believed to be difficult for quantum computers to solve, while other algorithms are not quantum-safe because they are vulnerable to attacks by quantum computers.