金匮是什么意思| 舌苔白厚腻吃什么药见效快| 守望先锋是什么类型的游戏| roca是什么品牌| 补气养血吃什么中成药| 鸡蛋白是什么| 法图麦是什么意思| 烧酒是什么酒| 疖肿是什么意思| 冬枣不能和什么一起吃| 喝苹果醋有什么好处和坏处| 牙酸是什么原因| 肌酸粉有什么作用| 什么星座最厉害| 嗓子哑了吃什么药好| 枫树叶子像什么| 大秀是什么意思| 道听途说是什么意思| 下鼻甲肥大是什么意思| eu是什么元素| 什么叫感性的女人| 生化妊娠是什么原因导致的| 梦见棺材什么意思| 什么功尽弃| 阑尾炎吃什么药最有效| 1973属什么生肖| 肌张力高对宝宝有什么影响| 天秤座是什么星座| 木薯是什么| 就绪是什么意思| 鱼油对身体有什么好处| 夏天为什么会下冰雹| 什么是包皮过长| 肝是什么器官| 窦性心律不齐有什么危害| kolumb是什么牌子| 改姓需要什么手续| 认干妈有什么讲究| b型血为什么招蚊子| 情是什么意思| 地米是什么药| 小动脉瘤是什么意思| 女性口臭都是什么原因| 图腾是什么意思| 乙肝25阳性什么意思| 1970年五行属什么| 突然胃疼是什么原因| 立冬和冬至什么区别| 肠胀气吃什么药| 为什么黑色吸热| 犹太人为什么有钱| 丝状疣用什么药膏最好| 什么是肽| 为什么不建议开眼角| 撮鸟是什么意思| 宫保鸡丁宫保是指什么| polo衫配什么裤子好看| 乳房疼痛挂什么科| 三月27号是什么星座| 谷草转氨酶偏低是什么意思| 肚子跳动是什么原因| 994是什么意思| 天天吹空调有什么危害| 6月8日什么星座| 打嗝和嗳气有什么区别| 人为什么会得阑尾炎| 什么运动瘦脸| 县教育局局长是什么级别| 女人太瘦吃什么增肥| 费力不讨好是什么生肖| 类风湿性关节炎的症状是什么| 打破伤风挂什么科| 肌肉劳损吃什么药| 咳嗽无痰吃什么药| 尿频是什么原因| 红海是什么意思| 肾寒吃什么中成药| 宽带m是什么意思| color是什么意思| 覅什么意思| 菊花像什么比喻句| 荼什么意思| ct能检查出什么| 獭尾肝是什么意思| 次月什么意思| 医学上pi是什么意思| 1999年属什么生肖| 中阴身是什么意思| 吃什么吐什么喝水都吐怎么办| 血氯高是什么原因| 耸是什么意思| 原汤化原食什么意思| 不解之谜的意思是什么| 十二月十四日是什么星座| 吃什么容易便秘| 甲胎蛋白高是什么原因| 人为什么会说梦话| 有白带发黄是什么原因| 为什么睡觉| 老年痴呆挂什么科| 人大常委会主任是什么级别| 什么茶降火| 伤官见官什么意思| 江西老表是什么意思| 男的结扎有什么影响| 口腔溃疡需要补充什么维生素| 什么是功德| 梦见西红柿是什么预兆| 什么时候立夏| 什么叫211大学| 馒头逼是什么| 胡子长得快是什么原因| 马来西亚主食吃什么| 2003是什么年| 新生儿屁多是什么原因| 文采是什么意思| 当我谈跑步时我谈些什么| 处事不惊是什么意思| 胃不好吃什么最养胃| 痔疮的症状是什么| 肾主骨是什么意思| 肌无力有什么症状| 与虎谋皮什么意思| 一级亲属指的是什么| 十二月份的是什么星座| 喧宾夺主什么意思| 补气血什么季节补最好| 724是什么意思| 挂失补办身份证需要什么| 蚊子咬了为什么痒| 对等是什么意思| 着实是什么意思| 吃什么水果变白| 改姓氏需要什么手续| 圣诞节的礼物什么时候送| 心包积液是什么意思| 老打喷嚏是什么原因| 吃什么养发| 查五行缺什么| 胆囊壁胆固醇结晶是什么意思| 爱发朋友圈的女人是什么心态| 10月1什么星座| 52什么意思| 脑动脉硬化是什么意思| 吃什么可以增强抵抗力和免疫力| 强五行属什么| da医学上是什么意思| 安之若素什么意思| 梦见鳝鱼是什么预兆| OB什么意思| 兰花象征着什么| hiv是什么| 脸上长白斑是什么原因| 三线炎有什么症状| 梦见买袜子是什么意思| 不妄作劳什么意思| emma什么意思| 治疗肝脏硬化要吃什么药好| 淋巴结长什么样| 玉和翡翠有什么区别| 睡眠不好总做梦是什么原因| 大腿后侧疼痛什么原因| 脚腕筋疼是什么原因| 购物狂是什么心理疾病| 尿酸是什么| 啤酒是什么酿造的| 卫生局是什么单位| 王安石号什么| 苏轼是什么派诗人| 腕管综合征吃什么药| 为什么打哈欠会传染| 强心剂是什么药| 什么是膝关节退行性变| 11月18号是什么星座的| 金骏眉茶是什么茶| 夏枯草有什么作用| 手指发红是什么原因| 身上长红痣是什么原因| 清洁度111是什么意思| 结石有什么症状| 左肩膀疼是什么原因| 吃人肉会得什么病| 葳蕤是什么意思| 火加同念什么| 男性阴虱用什么药最好| 87年是什么年| 血常规是什么意思| 铁扇公主是什么妖精| 咖啡和什么不能一起吃| 蚊虫叮咬过敏用什么药| 壬申日是什么意思| 维生素h的作用及功能主治是什么| b超是什么| 不亚于是什么意思| 亚甲减是什么意思| 俄罗斯特工组织叫什么| 尼哥是什么意思| 肺炎衣原体阳性是什么意思| 三点水一个希读什么| 湿疹吃什么药好| 内科查什么| 梦见很多鱼是什么意思| 副高是什么意思| 影子代表什么生肖| 苹果代表什么生肖| 东北易帜是什么意思| 昙花一现什么意思| 红袖什么意思| 夏雨什么| l do是什么意思| 7代表什么意思| 老是嗳气是什么原因| 乳腺导管局限性扩张是什么意思| 衣服最小码是什么字母| 什么是电解质| 小孩说话不清楚挂什么科| 白糖和冰糖有什么区别| 尿频尿急小腹胀痛吃什么药| 体脂是什么| 输卵管堵塞是什么原因造成的| 晴雨表是什么意思| 固体玉米糖浆是什么| 尿酸高肌酐高是什么原因呢| 惊艳了时光温柔了岁月什么意思| 希特勒为什么恨犹太人| 泡沫尿吃什么药| 什么是新陈代谢| 线性骨折是什么意思| 手脚不协调是什么原因| 类风湿关节炎吃什么药| 大门是什么生肖| 早早孕是什么意思| 垒是什么意思| 宝宝为什么喜欢趴着睡| eb病毒感染是什么病| 长期喝豆浆有什么好处和坏处| 梦见被蛇追着咬是什么意思| 蛛网膜囊肿挂什么科| 氰化钠是什么| 虎头什么尾| 狐臭挂什么科室的号| 什么是因果| 超拔是什么意思| 美国为什么不打朝鲜| 男生眉毛浓黑代表什么| 犀利是什么意思| 紫砂壶泡什么茶最好| 湿热体质适合喝什么茶| 怕痒的男人意味着什么| 天然气是什么味道| 小孩子记忆力差是什么原因| 儿童经常流鼻血什么原因造成的| 舒张压偏高是什么原因| 八月十三什么星座| 1004是什么星座| 为什么醋能让疣体脱落| 极差是什么| 封建社会是什么意思| 心慌心跳吃什么药| 奴仆宫是什么意思| 嘴唇紫黑是什么原因| supreme是什么牌子| 主动脉钙化什么意思| 零和游戏是什么意思| 百度
by Lamont Wood

博通或成东芝芯片业务新东家 获180亿美元资金支持

feature
Mar 21, 201110 mins
Data and Information SecurityEndpoint ProtectionSecurity

The tidy world of cryptography may be upended by the arrival of quantum computers.

百度 另外,通知还规定,对符合要求的全装修商品住宅项目,相关部门(单位)应从项目审批、金融信贷、资金补贴、信用评价、评优评先等方面进一步加大政策支持力度。

In the indictment that led to the expulsion of 10 Russian spies from the U.S. last summer, the FBI said that it had gained access to their encrypted communications after surreptitiously entering one of the spies’ homes, where agents found a piece of paper with a 27-character password.

In essence, the FBI found it more productive to burglarize a house than to crack a 216-bit code, despite having the computational resources of the U.S. government behind it. That’s because modern cryptography, when used correctly, is very strong. Cracking an encrypted message can take an incredibly long time.

“The entire commercial world runs off the assumption that encryption is rock-solid and is not breakable,” says Joe Moorcones, a vice president at SafeNet, an information security vendor in Belcamp, Md.

That’s the case today. But within the foreseeable future, cracking those same codes could become trivial, thanks to quantum computing.

Before learning about the threat of quantum computing, it helps to understand the current state of encryption. There are two kinds of encryption algorithms used in enterprise-level communications security: symmetric and asymmetric, Moorcones explains. Symmetric algorithms are typically used to send the actual information, whereas asymmetric algorithms are used to send both the information and the keys.

Symmetric encryption requires that the sender and receiver both use the same algorithm and the same encryption key. Decryption is simply the reverse of the encryption process — hence the “symmetric” label.

There are numerous symmetric algorithms, but most enterprises use the Advanced Encryption Standard (AES), published in 2001 by the National Institute of Standards and Technology after five years of testing. It replaced the Data Encryption Standard (DES), which debuted in 1976 and uses a 56-bit key.

AES, which typically uses keys that are either 128 or 256 bits long, has never been broken, while DES can now be broken in a matter of hours, Moorcones says. AES is approved for sensitive U.S. government information that is not classified, he adds.

As for classified information, the algorithms used to protect it are, of course, themselves classified. “They’re more of the same — they put in more bells and whistles to make them harder to crack,” says IDC analyst Charles Kolodgy. And they use multiple algorithms, he says.

The genuine weakness of AES — and any symmetric system — is that the sender has to get the key to the receiver. If that key is intercepted, transmissions become an open book. That’s where asymmetric algorithms come in.

Moorcones explains that asymmetric systems are also called public-key cryptography because they use a public key for encryption — but they use a different, private key for decryption. “You can post your public key in a directory with your name next to it, and I can use it to encrypt a message to you, but you are the only person with your private key, so you are the only person who can decrypt it.”

The most common asymmetric algorithm is RSA (named for inventors Ron Rivest, Adi Shamir and Len Adleman). It is based on the difficulty of factoring large numbers, from which the two keys are derived.

But RSA messages with keys as long as 768 bits have been broken, says Paul Kocher, head of security firm Cryptography Research in San Francisco. “I would guess that in five years, even 1,024 bits will be broken,” he says.

Moorcones adds, “You often see 2,048-bit RSA keys used to protect 256-bit AES keys.”

Besides creating longer RSA keys, users are also turning to elliptic curve (EC) algorithms, based on the math used to describe curves, with security again increasing with the size of the key. EC can offer the same security with one-fourth the computational complexity of RSA, Moorcones says. However, EC encryption up to 109 bits has been broken, Kocher notes.

RSA remains popular with developers because implementation requires only multiplication routines, leading to simpler programming and higher throughput, Kocher says. Also, all the applicable patents have expired. For its part, EC is better when there are bandwidth or memory constraints, he adds.

The Quantum Leap

But this tidy world of cryptography may be seriously disrupted by the arrival of quantum computers.

“There has been tremendous progress in quantum computer technology during the last few years,” says Michele Mosca, deputy director of the Institute for Quantum Computing at the University of Waterloo in Ontario. Mosca notes that in the past 15 years, we have moved from playing with quantum bits to building quantum logic gates. At that rate, he thinks it’s likely we will have a quantum computer within 20 years.

“It’s a game-changer,” Mosca says, explaining that the change comes not from improvements in the computer’s clock speed, but from an astronomical reduction in the number of steps needed to perform certain computations.

Basically, Mosca explains, a quantum computer should be able to use the properties of quantum mechanics to probe for patterns within a huge number without having to examine every digit in that number. Cracking both RSA and EC ciphers involves that very task — finding patterns in huge numbers.

Mosca explains that with a conventional computer, finding a pattern for an EC cipher with N number of bits in the key would take a number of steps equal to 2 raised to one-half N. As an example, for 100 bits (a modest number), it would take 250 (1.125 quadrillion) steps.

With a quantum computer, it should take about 50 steps, he says, which means code-breaking would then be no more computationally demanding than the original encryption process.

With RSA, determining the number of steps needed for a solution through conventional computation is more complicated than with EC encryption, but the scale of the reduction with quantum computation should be similar, Mosca says.

The situation is less dire with symmetric encryption, Mosca explains. Breaking a symmetric code like AES is a matter of searching all possible key combinations for the one that works. With a 128-bit key, there are 2128 possible combinations. But thanks to a quantum computer’s ability to probe large numbers, only the square root of the number of combinations needs to be examined — in this case, 264. This is still a huge number, and AES should remain secure with increased key sizes, Mosca says.

Timing Issues

When will quantum computing threaten the status quo? “We don’t know,” says Mosca. To many people, 20 years seems a long way off, but in the world of cybersecurity, it’s right around the corner. “Is that an acceptable risk? I don’t think so. So we need to start figuring out what alternatives to deploy, since it takes many years to change the infrastructure,” Mosca says.

SafeNet’s Moorcones disagrees. “DES lasted for 30 years, and AES is good for another 20 or 30 years,” he says. Increases in computing power can be countered by changing keys more often — with each new message, if necessary — since many enterprises currently change their key only once every 90 days, he notes. Every key, of course, requires a fresh cracking effort, as any success with one key isn’t applicable to the next.

When it comes to encryption, the rule of thumb is that “you want your messages to provide 20 years or more of security, so you want any encryption that you use to remain strong 20 years from now,” says IDC’s Kolodgy.

For the time being, “code-breaking today is an end-run game — it’s all about snatching the user’s machine,” says Kolodgy. “These days, if you pull something out of the air, you can’t decrypt it.”

But the biggest challenge with encryption is making sure that it’s actually used.

“All business-critical data should be encrypted at rest, especially credit card data,” says Richard Stiennon at IT-Harvest, an IT security research firm in Birmingham, Mich. “The Payment Card Industry Security Standards Council requires that merchants encrypt it — or, better yet, not store it at all. And data-breach notification laws don’t require you to disclose your lost data if it was encrypted.”

And, of course, leaving your encryption keys lying around on slips of paper can also turn out to be a bad idea.

Wood is a freelance writer in San Antonio.

This version of this story was originally published in Computerworld‘s print edition. It was adapted from an article that appeared earlier on Computerworld.com.

顽固性失眠吃什么药 炒菜什么时候放盐最合适 死去活来是什么生肖 温柔的动物是什么生肖 五月二十号是什么星座
什么凌乱 前列腺钙化斑是什么意思 修造是什么意思 无药可救是什么意思 黄瓜片贴脸上有什么效果
嘴唇起水泡是什么原因 小周天是什么意思 什么东西补钾 老人肚子胀是什么原因 吃什么补肝养肝最有效
死党什么意思 小孩积食发烧吃什么药 白带异常用什么药 宝宝感冒吃什么药 谁与争锋是什么意思
脚脖子抽筋是什么原因hcv7jop7ns4r.cn 吃蝎子有什么好处hcv9jop1ns6r.cn 扬州有什么好玩的地方hcv8jop2ns4r.cn 安全期是什么hcv8jop7ns8r.cn 吃什么东西能变白hcv8jop4ns3r.cn
4月5号是什么星座hcv9jop1ns5r.cn 吴刚和嫦娥什么关系hcv8jop8ns3r.cn 1951年属什么生肖hcv7jop4ns6r.cn 鞭炮笋学名叫什么bfb118.com 不利是什么意思wuhaiwuya.com
什么的肥料zsyouku.com 辣椒蟹吃什么520myf.com 超市属于什么行业hcv9jop6ns9r.cn 11.6号是什么星座hcv9jop5ns1r.cn 手指痛挂什么科hcv9jop7ns9r.cn
为什么瘦不下来travellingsim.com 海葡萄是什么东西hcv8jop9ns2r.cn 阅读有什么好处hcv8jop3ns5r.cn 睡久了头疼是什么原因hcv8jop3ns3r.cn 颜面扫地什么意思hcv8jop1ns4r.cn
百度