{"id":1120483,"date":"2023-12-28T23:52:54","date_gmt":"2023-12-29T04:52:54","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/scientists-think-theyve-created-the-worlds-1st-practical-quantum-secure-algorithm-livescience-com\/"},"modified":"2023-12-28T23:52:54","modified_gmt":"2023-12-29T04:52:54","slug":"scientists-think-theyve-created-the-worlds-1st-practical-quantum-secure-algorithm-livescience-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/quantum-computing\/scientists-think-theyve-created-the-worlds-1st-practical-quantum-secure-algorithm-livescience-com\/","title":{"rendered":"Scientists think they&#8217;ve created the world&#8217;s 1st &#8216;practical&#8217; quantum-secure algorithm &#8211; Livescience.com"},"content":{"rendered":"<p><p>    Scientists think they've created the first practical    cryptographic algorithm that could protect data and    communications from quantum computers.  <\/p>\n<p>    However, other experts in the field remain skeptical, saying    algorithms backed by a cutting-edge U.S.-government-funded lab    have a better chance of being used widely.  <\/p>\n<p>    Cryptography tools, like WhatsApp's end-to-end encryption,    protect data  like messages sent between two people  by    scrambling it into a secret code that only a unique digital key    can unlock. If hackers intercept an encrypted message, all    they'll see is jumbled-up nonsense. The hacker could try to    guess the cryptographic key and decipher the message, but it    would take the most powerful supercomputer millions of years to    try every possible combination  which these machines would    perform one at a time.  <\/p>\n<p>    Quantum computers, on the other hand, can perform several    calculations at once. They aren't powerful enough to break    cryptography yet, but scientists plan to develop increasingly    powerful machines that could one day bypass this essential    security layer within seconds.  <\/p>\n<p>    Now, researchers say they've developed the most efficient    quantum-safe proposal to date, based on existing so-called    verifiable random function (VRF) technology, which they dub    \"LaV.\" They described their research in a paper, which has not    yet been peer-reviewed, published Nov. 14 in the    Cryptology ePrint    Archive, a cryptology research preprint database.  <\/p>\n<p>    VRF takes a series of inputs, computes them, and churns out a    random number that can be cryptographically verified to be    random. It's usually an add-on to encryption that boosts the    security of digital platforms. It's an essential part of        WhatsApp's key transparency protocol, as well as    some blockchain systems.  <\/p>\n<p>    But LaV is a quantum-safe version of VRF. Unlike its    predecessor, it could theoretically provide end-to-end security    from quantum computers, said lead researcher    Muhammed    Esgin, an information technology lecturer at Monash    University in Australia.  <\/p>\n<p>    Related link:     Chinese researchers to send an 'uncrackable' quantum    message to space  <\/p>\n<p>    \"Our algorithm is designed to withstand theoretical and    practical attacks even by large-scale quantum computers (that    can break today's classical cryptographic algorithms),\" Esgin    told Live Science in an email. \"So it can protect against    today's supercomputers as well as tomorrow's powerful quantum    computers.\"  <\/p>\n<p>    LaV can be accessed through the open-source platform    GitLab. Its    creators claim it's a practical solution, as opposed to four    candidates backed by the National Institute of Standards and    Technology (NIST), which has been hunting for a quantum    encryption protocol for years. However, some experts disagree.  <\/p>\n<p>    LaV may not be the best solution to the impending quantum    threat, Edward    Parker, a physical scientist with The RAND Corporation,    told Live Science.  <\/p>\n<p>    \"There are several existing quantum-secure cryptography    algorithms that already exist,\" he said, and NIST is    standardizing these tools, \"essentially giving those four    algorithms the U.S. government's stamp of approval for    widespread use.\"  <\/p>\n<p>    \"It's widely expected that these four algorithms will become    the backbone of future quantum-secure cryptography, rather than    LaV or any of the dozens of other quantum-secure algorithms    that have been proposed,\" he added. \"The four algorithms that    NIST selected have undergone several years of very careful    vetting, and we can be very confident that they are indeed    secure.\"  <\/p>\n<p>    Jonathan    Katz, a computer scientist at the University of    Maryland's Institute for Advanced Computer Studies (UMIACS),    also backsNIST's efforts. \"The cryptography research community    has been working on quantum-safe algorithms for well over two    decades, and the NIST post-quantum cryptography standardization    effort began in 2017,\" he told Live Science in an email.  <\/p>\n<p>    However, Parker added that \"it's certainly possible that LaV    may be somewhat more efficient than other quantum-secure    algorithms.\"  <\/p>\n<p>    Vlatko    Vedral, a professor of quantum information science at    the University of Oxford, told Live Science he suspects LaV may    not be the first algorithm of its type, though it may be the    first released publicly.  <\/p>\n<p>    \"The industry is getting closer and closer to making a    large-scale quantum computer, and it is only natural that    various protections against its negative uses are being    explored,\" Vedral said. \"Code making and code breaking have    always been locked into an arms race against each other.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.livescience.com\/technology\/computing\/experts-divided-over-claims-of-1st-practical-algorithm-to-protect-data-from-quantum-computers\" title=\"Scientists think they've created the world's 1st 'practical' quantum-secure algorithm - Livescience.com\">Scientists think they've created the world's 1st 'practical' quantum-secure algorithm - Livescience.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Scientists think they've created the first practical cryptographic algorithm that could protect data and communications from quantum computers. However, other experts in the field remain skeptical, saying algorithms backed by a cutting-edge U.S.-government-funded lab have a better chance of being used widely.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/quantum-computing\/scientists-think-theyve-created-the-worlds-1st-practical-quantum-secure-algorithm-livescience-com\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[257742],"tags":[],"class_list":["post-1120483","post","type-post","status-publish","format-standard","hentry","category-quantum-computing"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1120483"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1120483"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1120483\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1120483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1120483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1120483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}