Emerging Technologies

The Future of Cryptography

5 views By Btissam
The Future of Cryptography

ย ๐ƒ๐ฎ๐ž ๐ญ๐จ ๐ช๐ฎ๐š๐ง๐ญ๐ฎ๐ฆ ๐œ๐จ๐ฆ๐ฉ๐ฎ๐ญ๐ข๐ง๐ , ๐ฆ๐š๐ง๐ฒ ๐œ๐จ๐ง๐ญ๐ž๐ฆ๐ฉ๐จ๐ซ๐š๐ซ๐ฒ ๐œ๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐š๐ฉ๐ก๐ข๐œ ๐ฆ๐ž๐ญ๐ก๐จ๐๐ฌ ๐ญ๐ก๐š๐ญ ๐ฌ๐š๐Ÿ๐ž๐ ๐ฎ๐š๐ซ๐ ๐๐ข๐ ๐ข๐ญ๐š๐ฅ ๐œ๐จ๐ฆ๐ฆ๐ฎ๐ง๐ข๐œ๐š๐ญ๐ข๐จ๐ง, ๐Ÿ๐ข๐ง๐š๐ง๐œ๐ข๐š๐ฅ ๐ญ๐ซ๐š๐ง๐ฌ๐š๐œ๐ญ๐ข๐จ๐ง๐ฌ, ๐š๐ง๐ ๐ฌ๐ž๐ง๐ฌ๐ข๐ญ๐ข๐ฏ๐ž ๐๐š๐ญ๐š ๐š๐ซ๐ž ๐š๐ญ ๐๐š๐ง๐ ๐ž๐ซ. ๐๐ฎ๐š๐ง๐ญ๐ฎ๐ฆ ๐œ๐จ๐ฆ๐ฉ๐ฎ๐ญ๐ž๐ซ๐ฌ ๐ฆ๐š๐ฒ ๐›๐ซ๐ž๐š๐ค ๐๐ž๐œ๐š๐๐ž๐ฌ-๐จ๐ฅ๐ ๐ž๐ง๐œ๐ซ๐ฒ๐ฉ๐ญ๐ข๐จ๐ง ๐ฌ๐œ๐ก๐ž๐ฆ๐ž๐ฌ ๐ฅ๐ข๐ค๐ž ๐‘๐’๐€ ๐š๐ง๐ ๐„๐‚๐‚ ๐๐ฎ๐ž ๐ญ๐จ ๐ญ๐ก๐ž๐ข๐ซ ๐ฉ๐ซ๐จ๐œ๐ž๐ฌ๐ฌ๐ข๐ง๐  ๐œ๐š๐ฉ๐š๐œ๐ข๐ญ๐ฒ. ๐๐จ๐ฌ๐ญ-๐๐ฎ๐š๐ง๐ญ๐ฎ๐ฆ ๐‚๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐š๐ฉ๐ก๐ฒ (๐๐๐‚) ๐ฉ๐ซ๐จ๐œ๐ž๐๐ฎ๐ซ๐ž๐ฌ ๐š๐ง๐ ๐š๐ฉ๐ฉ๐ซ๐จ๐š๐œ๐ก๐ž๐ฌ ๐ฉ๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐ฌ๐ž๐ง๐ฌ๐ข๐ญ๐ข๐ฏ๐ž ๐๐š๐ญ๐š ๐Ÿ๐ซ๐จ๐ฆ ๐ช๐ฎ๐š๐ง๐ญ๐ฎ๐ฆ ๐œ๐จ๐ฆ๐ฉ๐ฎ๐ญ๐ž๐ซ๐ฌโ€™ ๐ฉ๐ซ๐จ๐œ๐ž๐ฌ๐ฌ๐ข๐ง๐  ๐œ๐š๐ฉ๐š๐œ๐ข๐ญ๐ฒ.. ย The current state of encryption [โ€ฆ]

 ๐ƒ๐ฎ๐ž ๐ญ๐จ ๐ช๐ฎ๐š๐ง๐ญ๐ฎ๐ฆ ๐œ๐จ๐ฆ๐ฉ๐ฎ๐ญ๐ข๐ง๐ , ๐ฆ๐š๐ง๐ฒ ๐œ๐จ๐ง๐ญ๐ž๐ฆ๐ฉ๐จ๐ซ๐š๐ซ๐ฒ ๐œ๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐š๐ฉ๐ก๐ข๐œ ๐ฆ๐ž๐ญ๐ก๐จ๐๐ฌ ๐ญ๐ก๐š๐ญ ๐ฌ๐š๐Ÿ๐ž๐ ๐ฎ๐š๐ซ๐ ๐๐ข๐ ๐ข๐ญ๐š๐ฅ ๐œ๐จ๐ฆ๐ฆ๐ฎ๐ง๐ข๐œ๐š๐ญ๐ข๐จ๐ง, ๐Ÿ๐ข๐ง๐š๐ง๐œ๐ข๐š๐ฅ ๐ญ๐ซ๐š๐ง๐ฌ๐š๐œ๐ญ๐ข๐จ๐ง๐ฌ, ๐š๐ง๐ ๐ฌ๐ž๐ง๐ฌ๐ข๐ญ๐ข๐ฏ๐ž ๐๐š๐ญ๐š ๐š๐ซ๐ž ๐š๐ญ ๐๐š๐ง๐ ๐ž๐ซ. ๐๐ฎ๐š๐ง๐ญ๐ฎ๐ฆ ๐œ๐จ๐ฆ๐ฉ๐ฎ๐ญ๐ž๐ซ๐ฌ ๐ฆ๐š๐ฒ ๐›๐ซ๐ž๐š๐ค ๐๐ž๐œ๐š๐๐ž๐ฌ-๐จ๐ฅ๐ ๐ž๐ง๐œ๐ซ๐ฒ๐ฉ๐ญ๐ข๐จ๐ง ๐ฌ๐œ๐ก๐ž๐ฆ๐ž๐ฌ ๐ฅ๐ข๐ค๐ž ๐‘๐’๐€ ๐š๐ง๐ ๐„๐‚๐‚ ๐๐ฎ๐ž ๐ญ๐จ ๐ญ๐ก๐ž๐ข๐ซ ๐ฉ๐ซ๐จ๐œ๐ž๐ฌ๐ฌ๐ข๐ง๐  ๐œ๐š๐ฉ๐š๐œ๐ข๐ญ๐ฒ. ๐๐จ๐ฌ๐ญ-๐๐ฎ๐š๐ง๐ญ๐ฎ๐ฆ ๐‚๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐š๐ฉ๐ก๐ฒ (๐๐๐‚) ๐ฉ๐ซ๐จ๐œ๐ž๐๐ฎ๐ซ๐ž๐ฌ ๐š๐ง๐ ๐š๐ฉ๐ฉ๐ซ๐จ๐š๐œ๐ก๐ž๐ฌ ๐ฉ๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐ฌ๐ž๐ง๐ฌ๐ข๐ญ๐ข๐ฏ๐ž ๐๐š๐ญ๐š ๐Ÿ๐ซ๐จ๐ฆ ๐ช๐ฎ๐š๐ง๐ญ๐ฎ๐ฆ ๐œ๐จ๐ฆ๐ฉ๐ฎ๐ญ๐ž๐ซ๐ฌ’ ๐ฉ๐ซ๐จ๐œ๐ž๐ฌ๐ฌ๐ข๐ง๐  ๐œ๐š๐ฉ๐š๐œ๐ข๐ญ๐ฒ..

 The current state of encryption is based on difficult mathematical problems that traditional computers have a hard time solving. Quantum computers, on the other hand, may use techniques like Shor’s Algorithm to crack these codes far more quickly. The data we encrypt now, like healthcare and government information, might be at risk if attackers were to intercept encrypted transmissions for eventual decoding, even if fully operational quantum computers are still decades away.

โ†ช๐‚๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐š๐ฉ๐ก๐ฒ ๐š๐Ÿ๐ญ๐ž๐ซ ๐ช๐ฎ๐š๐ง๐ญ๐ฎ๐ฆ ๐œ๐จ๐ฆ๐ฉ๐ฎ๐ญ๐ข๐ง๐  (๐๐๐‚)
We need to create and implement Post-Quantum Cryptography (PQC) to fight this danger. The four quantum-resistant algorithmsโ€”CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+โ€”were disclosed by the National Institute of Standards and Technology (NIST) in 2022. Data security in the quantum age is guaranteed by these algorithms, which can survive assaults from both classical and quantum realms.

โ†ช ๐Š๐ž๐ฒ ๐ƒ๐ข๐ฌ๐ญ๐ซ๐ข๐›๐ฎ๐ญ๐ข๐จ๐ง ๐ข๐ง ๐๐ฎ๐š๐ง๐ญ๐ฎ๐ฆ ๐’๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ (๐๐Š๐ƒ)
Quantum Key Distribution (QKD) is an additional security mechanism to PQC that uses quantum mechanics to make eavesdropping very difficult, if not impossible, during key exchanges. Yet, before QKD can be extensively adopted, we still need to solve practical issues including distance constraints and the requirement for additional infrastructure.

 Companies need to start incorporating algorithms that are resistant to quantum assaults and determine what data is susceptible to these attacks. To make the transition easier and more compatible, a hybrid technique is recommended, which incorporates conventional and post-quantum cryptography.

Comments

0 comment(s)

No comments yet. Be the first to share your thoughts.

Leave a comment

Related articles

Emerging Technologies

ย Last week, I had the privilege to take part in the Global Council for Responsible AI Leadership Workshop at Lake Como, Italy โ€” a unique gathering of leaders from government, industry, and academia working together on one of the most pressing challenges of our time. ๐…๐จ๐ซ ๐ญ๐ฐ๐จ ๐๐š๐ฒ๐ฌ, ๐ฐ๐ž ๐œ๐จ๐ฅ๐ฅ๐š๐›๐จ๐ซ๐š๐ญ๐ž๐ ๐ญ๐จ ๐ฌ๐ก๐š๐ฉ๐ž ๐ญ๐ก๐ž ๐Ÿ๐ข๐ซ๐ฌ๐ญ ๐๐ซ๐š๐Ÿ๐ญ [โ€ฆ]

Emerging Technologies

๐—ช๐—ฒ ๐˜๐—ฎ๐—น๐—ธ ๐—ฎ ๐—น๐—ผ๐˜ ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ โ€œ๐˜๐—ฟ๐˜‚๐˜€๐˜ ๐—ถ๐—ป ๐—”๐—œโ€โ€ฆ ๐—ฏ๐˜‚๐˜ ๐—ต๐—ผ๐˜„ ๐—ฑ๐—ผ ๐˜„๐—ฒ ๐—ฎ๐—ฐ๐˜๐˜‚๐—ฎ๐—น๐—น๐˜† ๐—ฝ๐—ฟ๐—ผ๐˜ƒ๐—ฒ ๐—ถ๐˜?

๐—ช๐—ฒ ๐˜๐—ฎ๐—น๐—ธ ๐—ฎ ๐—น๐—ผ๐˜ ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ โ€œ๐˜๐—ฟ๐˜‚๐˜€๐˜ ๐—ถ๐—ป ๐—”๐—œโ€โ€ฆ ๐—ฏ๐˜‚๐˜ ๐—ต๐—ผ๐˜„ ๐—ฑ๐—ผ ๐˜„๐—ฒ ๐—ฎ๐—ฐ๐˜๐˜‚๐—ฎ๐—น๐—น๐˜† ๐—ฝ๐—ฟ๐—ผ๐˜ƒ๐—ฒ ๐—ถ๐˜? Iโ€™ve just completed the GRAICEโ„ข Foundational Training on Responsible AI Governance with the Global Council for Responsible AI (GCRAI), and one idea stood out clearly: ย Trust is not a feeling โ€” it must be measurable, structured, and auditable. As someone [โ€ฆ]

Emerging Technologies

๐‰๐ฎ๐ฅ๐ข๐š ๐š๐ง๐ ๐ญ๐ก๐ž ๐Œ๐ฒ๐ฌ๐ญ๐ž๐ซ๐ข๐จ๐ฎ๐ฌ ๐”๐’๐ ๐ƒ๐ซ๐ข๐ฏ๐ž

A Summer ๐‘š๐‘œ๐‘Ÿ๐‘›๐‘–๐‘›๐‘”, ๐ฝ๐‘ข๐‘™๐‘–๐‘Ž, ๐‘Ž๐‘› ๐‘’๐‘š๐‘๐‘™๐‘œ๐‘ฆ๐‘’๐‘’ ๐‘Ž๐‘ก XXX., ๐‘“๐‘œ๐‘ข๐‘›๐‘‘ ๐‘Ž ๐‘ˆ๐‘†๐ต ๐‘‘๐‘Ÿ๐‘–๐‘ฃ๐‘’ ๐‘œ๐‘› ๐‘กโ„Ž๐‘’ ๐‘”๐‘Ÿ๐‘œ๐‘ข๐‘›๐‘‘ ๐‘Ž๐‘  ๐‘ โ„Ž๐‘’ ๐‘Ž๐‘Ÿ๐‘Ÿ๐‘–๐‘ฃ๐‘’๐‘‘ ๐‘Ž๐‘ก ๐‘ค๐‘œ๐‘Ÿ๐‘˜.ย ย ๐‚๐ฎ๐ซ๐ข๐จ๐ฎ๐ฌ, ๐‘ โ„Ž๐‘’ ๐‘ค๐‘Ž๐‘  ๐‘Ž๐‘๐‘œ๐‘ข๐‘ก ๐‘ก๐‘œ ๐‘๐‘™๐‘ข๐‘” ๐‘–๐‘ก ๐‘–๐‘›๐‘ก๐‘œ โ„Ž๐‘’๐‘Ÿ ๐‘๐‘œ๐‘š๐‘๐‘ข๐‘ก๐‘’๐‘Ÿ ๐‘คโ„Ž๐‘’๐‘› โ„Ž๐‘’๐‘Ÿ ๐‘๐‘œ๐‘™๐‘™๐‘’๐‘Ž๐‘”๐‘ข๐‘’ ๐‘€๐‘Ž๐‘Ÿ๐‘, ๐‘กโ„Ž๐‘’ ๐‘๐‘ฆ๐‘๐‘’๐‘Ÿ๐‘ ๐‘’๐‘๐‘ข๐‘Ÿ๐‘–๐‘ก๐‘ฆ ๐‘’๐‘ฅ๐‘๐‘’๐‘Ÿ๐‘ก, ๐‘ ๐‘ก๐‘œ๐‘๐‘๐‘’๐‘‘ โ„Ž๐‘’๐‘Ÿ. โ€ ๐–๐š๐ข๐ญ, ๐‰๐ฎ๐ฅ๐ข๐š! ๐ˆ๐ญโ€™๐ฌ ๐๐š๐ง๐ ๐ž๐ซ๐จ๐ฎ๐ฌ ๐ญ๐จ ๐ฉ๐ฅ๐ฎ๐  ๐ข๐ง ๐š ๐”๐’๐ ๐๐ซ๐ข๐ฏ๐ž ๐ฒ๐จ๐ฎ ๐Ÿ๐จ๐ฎ๐ง๐ ๐จ๐ง ๐ญ๐ก๐ž ๐ ๐ซ๐จ๐ฎ๐ง๐. ๐ˆ๐ญ [โ€ฆ]