Cyber IT Supervisory Forum eBook
Internal Use Only
How do Quantum Computers Threaten Cryptography?
Quantum computers: harness special properties of quantum mechanics to perform calculations
Shor’s algorithm (1994) efficiently solves certain problems on a quantum computer that are beyond normal computer: Factoring large numbers Discrete logarithm
This threatens ALL asymmetric crypto in use today which assumes that these problems can’t be solved
23
© 2024 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-01698-01.
Internal Use Only
Is This a Big Deal? YES!
Asymmetric cryptography is ubiquitous! Most cryptography is enabled with asymmetric techniques – with very few exceptions
Used to provide confidentiality for data Secure Data at Rest
Signed and/or encrypted email
Secure web
Virtual private networks
Used to authenticate transactions between computers / devices E-Commerce IoT Software/firmware signing
Enterprise access to private resources
Cloud computing
Cryptocurrencies
24
© 2024 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-01698-01.
Made with FlippingBook Digital Publishing Software