Quantum Computers Pose Encryption Challenge To Google

by CXOtoday News Desk    Jul 13, 2016

encrypt

Quantum computers are the thing to work with, when it comes to large enterprises like IBM, Google, Microsoft, and the likes. However, this also poses a challenge as well; while quantum computers are faster and more powerful, they are also more adept at decrypting the current encryptions used in protocols behind HTTPS. This means that customer data privacy could be compromised with, something which Google is already trying to work around. As per Gadgets 360, Google is working on post-quantum computing algorithm, which would prevent the decryption of content, via new connections between Chrome on desktop and its own servers. 

Read Also: Facebook Messenger To Offer Encryption For ‘Secret Conversations’

Currently being used as an experiment, Google has plenty on its hands, as far as the encryption challenge goes. Quantum computers are already ahead in terms of technology and operational power, and have capabilities which could the asymmetric cryptographic primitives that are currently used in TLS, the security protocol behind HTTPS. Google is currently testing a new feature to protect user data from these futuristic quantum computers. In order to assure users, Google is known to have mentioned that it is experimenting only, on a few connections, with post-quantum key-exchange algorithm. Currently, the feature is being operated on the Google Chrome Canary, and user could check this, by looking for CECPQ1 under the key exchange in the browser security panel. 

Read Also: What Makes Encryption A Double-Edged Sword

However, to clarify things, Google issued a statement saying, “We explicitly do not wish to make our selected post-quantum algorithm a de-facto standard. To this end we plan to discontinue this experiment within two years, hopefully by replacing it with something better.” This also directly indicates that the algorithm could break in the future. In that case, the HTTPS standard elliptic-curve key-exchange algorithm is always there for secure connections.