Quantum Computers Pose Encryption Challenge To Google
Quantum computers are the thing to work with, when it comes to large enterprises like IBM, Google, Microsoft, and the likes. However, this also poses a challenge as well; while quantum computers are faster and more powerful, they are also more adept at decrypting the current encryptions used in protocols behind HTTPS. This means that customer data privacy could be compromised with, something which Google is already trying to work around. As per Gadgets 360, Google is working on post-quantum computing algorithm, which would prevent the decryption of content, via new connections between Chrome on desktop and its own servers.
Currently being used as an experiment, Google has plenty on its hands, as far as the encryption challenge goes. Quantum computers are already ahead in terms of technology and operational power, and have capabilities which could the asymmetric cryptographic primitives that are currently used in TLS, the security protocol behind HTTPS. Google is currently testing a new feature to protect user data from these futuristic quantum computers. In order to assure users, Google is known to have mentioned that it is experimenting only, on a few connections, with post-quantum key-exchange algorithm. Currently, the feature is being operated on the Google Chrome Canary, and user could check this, by looking for CECPQ1 under the key exchange in the browser security panel.
Read Also: What Makes Encryption A Double-Edged Sword
However, to clarify things, Google issued a statement saying, “We explicitly do not wish to make our selected post-quantum algorithm a de-facto standard. To this end we plan to discontinue this experiment within two years, hopefully by replacing it with something better.” This also directly indicates that the algorithm could break in the future. In that case, the HTTPS standard elliptic-curve key-exchange algorithm is always there for secure connections.
- Millennials and Cybersecurity: Understanding the Value of Personal Data
- AI Is Making BI Smarter
- Microsoft, DSCI Team Up To Fill The Women In Cybersecurity Gap
- Email Based cyberattacks Continue To Soar: Study
- Poor Router Security Makes Indians Vulnerable To Cyber Attacks
- What's BitLocker’s Role In Encryption And Compliance?
- Why 4 out of 10 Security Alerts Go Attended Daily In India?
- Is There A Weak Link In Your Encryption Strategy?
- New Security Flaw Grips Most Modern Laptops: F-Secure Researchers
- Multi-Factor Authentication Can Mitigate Password Risks: Study