Skip to main content

Home/ ITGSonline/ Group items tagged security quantum

Rss Feed Group items tagged

dr tech

Breathe Easy Bitcoiners, Quantum Computing No Match For Sha-2 Encryption | Hacked - 0 views

  •  
    "Some people assume that once quantum computing comes along modern encryption technologies will be outpowered. But experts are starting to posit that hash functions and asymmetric encryption could defend not only against modern computers, but also against quantum attackers from the future."
dr tech

Massive Disruption Is Coming With Quantum Computing - 0 views

  •  
    "Moore's Law (or the exponential growth of integrated circuits) is actually referring to the fifth paradigm of computation. Here's the list of the underlying technologies: (1) Electromechanical; (2) Vacuum Tube; (3) Relay; (4) Transistors; and (5) Integrated Circuits. Quantum computers may well be the sixth paradigm, given that they work in a fashion that is entirely different from "classical" computers"
dr tech

​Chrome: Stop future computers from cracking current encryption - CNET - 0 views

  •  
    "Google released a beta test version of its Chrome browser that attempts to keep your data secure even if today's uncrackable encryption becomes tomorrow's code-breaking cakewalk. The Chrome 54 beta gets the ability to encipher data sent to and from websites with a technology called CECPQ1. It "protects against future attacks using large quantum computers," Google said in a blog post Thursday."
dr tech

China launches quantum satellite for 'hack-proof' communications | World news | The Gua... - 0 views

  •  
    ""The satellite's two-year mission will be to develop 'hack-proof' quantum communications, allowing users to send messages securely and at speeds faster than light," Xinhua reported."
dr tech

Quantum computing: Game changer or security threat? - BBC News - 0 views

  •  
    "Quantum computing may offer potential benefits to the financial services industry, but it also poses risks. Banks rely on encryption to keep their transactions and customer data secure. This involves scrambling and unscrambling data using keys made of very large numbers - tens, if not hundreds, of digits long."
1 - 5 of 5
Showing 20 items per page