Turning Hard Problems into Post-quantum Solutions
By Gretchen L. Matthews
The key to safe encrypted information will be finding what’s difficult for both current and future computers to solve.
The key to safe encrypted information will be finding what’s difficult for both current and future computers to solve.
When I was a kid, before the days of home computers, my dad gave me large multiplication and division problems to keep me busy. As I got faster, he increased the numbers of digits so that the challenge would occupy roughly the same amount of time. However, it would have been a lot more difficult for him to keep me busy for 15 minutes or so if we’d had a computer; the arithmetic problems, painstakingly executed in my notebook, could have been calculated almost instantaneously by a computer, no matter how long those numbers got. The gulf between five-year-old me and a home computer is as inherently unbridgeable as the difference between a classical computer and a quantum machine, a gap with serious implications for the complex problems that underpin the modern-day cryptography that secures our digital worlds.
Click "American Scientist" to access home page
American Scientist Comments and Discussion
To discuss our articles or comment on them, please share them and tag American Scientist on social media platforms. Here are links to our profiles on Twitter, Facebook, and LinkedIn.
If we re-share your post, we will moderate comments/discussion following our comments policy.