<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Post Quantum Cryptography</title>
	<atom:link href="http://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 06 May 2026 11:53:30 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/comment-page-6/#comment-1877237</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 04 May 2026 08:37:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=58024#comment-1877237</guid>
		<description><![CDATA[https://etn.fi/index.php/13-news/18832-cisco-rakentaa-kvantti-internetin-puuttuvaa-palasta]]></description>
		<content:encoded><![CDATA[<p><a href="https://etn.fi/index.php/13-news/18832-cisco-rakentaa-kvantti-internetin-puuttuvaa-palasta" rel="nofollow">https://etn.fi/index.php/13-news/18832-cisco-rakentaa-kvantti-internetin-puuttuvaa-palasta</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/comment-page-6/#comment-1876780</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 26 Apr 2026 18:59:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=58024#comment-1876780</guid>
		<description><![CDATA[15-Bit ECC Key Broken on Quantum Hardware Wins Q-Day Prize
https://thequantuminsider.com/2026/04/24/project-eleven-q-day-prize-quantum-ecc-attack/

Insider Brief

Project Eleven awarded its Q-Day Prize to Giancarlo Lelli for demonstrating a 15-bit elliptic curve key break on a quantum computer.
The result extends prior public demonstrations and shows continued progress in quantum attacks on elliptic curve cryptography.
The work highlights ongoing reductions in resource estimates for larger-scale attacks and the need for migration to post-quantum cryptography.]]></description>
		<content:encoded><![CDATA[<p>15-Bit ECC Key Broken on Quantum Hardware Wins Q-Day Prize<br />
<a href="https://thequantuminsider.com/2026/04/24/project-eleven-q-day-prize-quantum-ecc-attack/" rel="nofollow">https://thequantuminsider.com/2026/04/24/project-eleven-q-day-prize-quantum-ecc-attack/</a></p>
<p>Insider Brief</p>
<p>Project Eleven awarded its Q-Day Prize to Giancarlo Lelli for demonstrating a 15-bit elliptic curve key break on a quantum computer.<br />
The result extends prior public demonstrations and shows continued progress in quantum attacks on elliptic curve cryptography.<br />
The work highlights ongoing reductions in resource estimates for larger-scale attacks and the need for migration to post-quantum cryptography.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/comment-page-6/#comment-1876748</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 26 Apr 2026 18:20:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=58024#comment-1876748</guid>
		<description><![CDATA[How Quantum Computing Affects Cryptography
https://thequantuminsider.com/2026/04/06/how-quantum-computing-affects-cryptography/

Quantum computing poses a fundamental threat to widely used encryption systems including RSA, elliptic curve cryptography, and Diffie-Hellman key exchange, which secure everything from online banking to government communications, with algorithms like Shor’s algorithm capable of breaking these schemes exponentially faster than classical computers.
The National Institute of Standards and Technology (NIST) has standardized post-quantum cryptographic algorithms designed to resist quantum attacks, and organizations worldwide are beginning the complex process of migrating critical systems to these new encryption methods.
The “harvest now, decrypt later” threat – where adversaries collect encrypted data today to decrypt once quantum computers become available – creates urgency for organizations handling sensitive long-term data, even though large-scale quantum computers capable of breaking encryption remain years away.
The cryptographic landscape is splitting between post-quantum cryptography (mathematical algorithms resistant to quantum attacks) and quantum key distribution (physics-based security using quantum networking), with governments, financial institutions, and technology companies investing billions in both approaches.]]></description>
		<content:encoded><![CDATA[<p>How Quantum Computing Affects Cryptography<br />
<a href="https://thequantuminsider.com/2026/04/06/how-quantum-computing-affects-cryptography/" rel="nofollow">https://thequantuminsider.com/2026/04/06/how-quantum-computing-affects-cryptography/</a></p>
<p>Quantum computing poses a fundamental threat to widely used encryption systems including RSA, elliptic curve cryptography, and Diffie-Hellman key exchange, which secure everything from online banking to government communications, with algorithms like Shor’s algorithm capable of breaking these schemes exponentially faster than classical computers.<br />
The National Institute of Standards and Technology (NIST) has standardized post-quantum cryptographic algorithms designed to resist quantum attacks, and organizations worldwide are beginning the complex process of migrating critical systems to these new encryption methods.<br />
The “harvest now, decrypt later” threat – where adversaries collect encrypted data today to decrypt once quantum computers become available – creates urgency for organizations handling sensitive long-term data, even though large-scale quantum computers capable of breaking encryption remain years away.<br />
The cryptographic landscape is splitting between post-quantum cryptography (mathematical algorithms resistant to quantum attacks) and quantum key distribution (physics-based security using quantum networking), with governments, financial institutions, and technology companies investing billions in both approaches.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/comment-page-6/#comment-1876621</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 22:06:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=58024#comment-1876621</guid>
		<description><![CDATA[https://thequantuminsider.com/2026/04/14/a-quantum-payload-reaches-orbit-commercial-quantum-communication-is-on-the-horizon/]]></description>
		<content:encoded><![CDATA[<p><a href="https://thequantuminsider.com/2026/04/14/a-quantum-payload-reaches-orbit-commercial-quantum-communication-is-on-the-horizon/" rel="nofollow">https://thequantuminsider.com/2026/04/14/a-quantum-payload-reaches-orbit-commercial-quantum-communication-is-on-the-horizon/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/comment-page-6/#comment-1876620</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 22:05:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=58024#comment-1876620</guid>
		<description><![CDATA[World’s first open-source quantum-resistant chip aims to anchor security in hardware
The consortium is using the open-standard RISC-V architecture to bake security directly into the hardware.
https://interestingengineering.com/science/open-source-quantum-resistant-chip]]></description>
		<content:encoded><![CDATA[<p>World’s first open-source quantum-resistant chip aims to anchor security in hardware<br />
The consortium is using the open-standard RISC-V architecture to bake security directly into the hardware.<br />
<a href="https://interestingengineering.com/science/open-source-quantum-resistant-chip" rel="nofollow">https://interestingengineering.com/science/open-source-quantum-resistant-chip</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/comment-page-6/#comment-1875913</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 06:04:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=58024#comment-1875913</guid>
		<description><![CDATA[Quantuum computing + AI = Something something dark side

We don&#039;t actually need quantum computers to have that crisis, just an algorithm that proves that P = NP.

Quantum resistant encryption is readily available today. The EU have a preferred algorithm as does the US. It just needs companies to change over to them. However. Some countries have been archiving encrypted communications from snooping operations for the day they can use quantum computers to decrypt them - national secrets and the like.

Anyone who says Y2K was a load of nothing is incredibly uneducated. The world pulled off some massive bugfixing and patching to prevent disaster in major infrastructure. Just because some office desktop pcs didn’t explode, don’t assume everything was easy.


“Y2K” wasn’t actually (even remotely) a ‘crisis’ though… so everything should be chill.

It’s important note that even switching to post-quantum cryptography isn’t going to make everything secure since all historic encrypted data that was already collected can still be decrypted.]]></description>
		<content:encoded><![CDATA[<p>Quantuum computing + AI = Something something dark side</p>
<p>We don&#8217;t actually need quantum computers to have that crisis, just an algorithm that proves that P = NP.</p>
<p>Quantum resistant encryption is readily available today. The EU have a preferred algorithm as does the US. It just needs companies to change over to them. However. Some countries have been archiving encrypted communications from snooping operations for the day they can use quantum computers to decrypt them &#8211; national secrets and the like.</p>
<p>Anyone who says Y2K was a load of nothing is incredibly uneducated. The world pulled off some massive bugfixing and patching to prevent disaster in major infrastructure. Just because some office desktop pcs didn’t explode, don’t assume everything was easy.</p>
<p>“Y2K” wasn’t actually (even remotely) a ‘crisis’ though… so everything should be chill.</p>
<p>It’s important note that even switching to post-quantum cryptography isn’t going to make everything secure since all historic encrypted data that was already collected can still be decrypted.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/comment-page-6/#comment-1875912</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 06:01:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=58024#comment-1875912</guid>
		<description><![CDATA[The day when a quantum computer manages to break common encryption, or Q-Day, is fast approaching and the world is not close to being ready.

Quantum computers could usher in a crisis worse than Y2K
The day when a quantum computer manages to break common encryption, or Q-Day, is fast approaching, and the world is not close to being ready
https://www.newscientist.com/article/2522615-quantum-computers-could-usher-in-a-crisis-worse-than-y2k/?fbclid=IwdGRjcARNTWFjbGNrBE1NLGV4dG4DYWVtAjExAHNydGMGYXBwX2lkDDM1MDY4NTUzMTcyOAABHrHIleI1jdGKN2b8yGxw6_rjvAbdqUoklPTbxufdiPZeOrhkN4Yir7whZTWd_aem_MnxkuDN_51gam0Hve0Tjdg&amp;utm_id=97758_v0_s00_e0_tv1_a1demo0ecg7rma

Quantum computers could cause a global security crisis that makes the once-feared millennium bug, or Y2K, look quaint. This infamous computer risk was averted through the persistent behind-the-scenes work of engineers across the world, but whether the new threat will be tackled similarly is an urgent yet unresolved question.

Most digital communications and transactions are protected by cryptography based on mathematical problems that are unsolvable by conventional computers but are solvable by a sufficiently capable quantum computer. Researchers have understood this since the late 1990s, but the day when this capable-enough quantum computer comes online – or Q-Day – was thought to be very far in the future. Much has changed since.]]></description>
		<content:encoded><![CDATA[<p>The day when a quantum computer manages to break common encryption, or Q-Day, is fast approaching and the world is not close to being ready.</p>
<p>Quantum computers could usher in a crisis worse than Y2K<br />
The day when a quantum computer manages to break common encryption, or Q-Day, is fast approaching, and the world is not close to being ready<br />
<a href="https://www.newscientist.com/article/2522615-quantum-computers-could-usher-in-a-crisis-worse-than-y2k/?fbclid=IwdGRjcARNTWFjbGNrBE1NLGV4dG4DYWVtAjExAHNydGMGYXBwX2lkDDM1MDY4NTUzMTcyOAABHrHIleI1jdGKN2b8yGxw6_rjvAbdqUoklPTbxufdiPZeOrhkN4Yir7whZTWd_aem_MnxkuDN_51gam0Hve0Tjdg&#038;utm_id=97758_v0_s00_e0_tv1_a1demo0ecg7rma" rel="nofollow">https://www.newscientist.com/article/2522615-quantum-computers-could-usher-in-a-crisis-worse-than-y2k/?fbclid=IwdGRjcARNTWFjbGNrBE1NLGV4dG4DYWVtAjExAHNydGMGYXBwX2lkDDM1MDY4NTUzMTcyOAABHrHIleI1jdGKN2b8yGxw6_rjvAbdqUoklPTbxufdiPZeOrhkN4Yir7whZTWd_aem_MnxkuDN_51gam0Hve0Tjdg&#038;utm_id=97758_v0_s00_e0_tv1_a1demo0ecg7rma</a></p>
<p>Quantum computers could cause a global security crisis that makes the once-feared millennium bug, or Y2K, look quaint. This infamous computer risk was averted through the persistent behind-the-scenes work of engineers across the world, but whether the new threat will be tackled similarly is an urgent yet unresolved question.</p>
<p>Most digital communications and transactions are protected by cryptography based on mathematical problems that are unsolvable by conventional computers but are solvable by a sufficiently capable quantum computer. Researchers have understood this since the late 1990s, but the day when this capable-enough quantum computer comes online – or Q-Day – was thought to be very far in the future. Much has changed since.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/comment-page-6/#comment-1875883</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 21:30:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=58024#comment-1875883</guid>
		<description><![CDATA[https://etn.fi/index.php/13-news/18469-taeaellae-testataan-kvanttiturvallista-datan-laehetystae

Kvanttitietokoneet uhkaavat murtaa internetin nykyisen luottamusmallin. Kanadassa tähän varaudutaan jo käytännössä. Québec Cityssä on avattu uusi solmu Kirq-testialustaan, jossa kvanttiturvallista datansiirtoa testataan aidossa verkkoympäristössä.

Testialustaa operoi Numana, joka yhdistää Sherbrooken, Montréalin ja nyt Québec Cityn samaan kvanttiturvalliseen verkkosilmukkaan. Kyse ei ole laboratoriokokeesta, vaan ympäristöstä, joka vastaa oikeaa runko- ja operaattoriverkkoa.

Kvanttiuhka ei kohdistu kaikkeen salaukseen. Symmetrinen salaus, kuten AES, säilyy käyttökelpoisena. Sen sijaan kvanttikoneet pystyvät murtamaan nykyiset asymmetriset menetelmät, joilla hoidetaan avaintenvaihto ja tunnistautuminen.

Juuri tätä Kirqissa testataan. Miten RSA- ja ECC-pohjaiset ratkaisut korvataan ilman, että verkot hajoavat. Käytännössä testaus nojaa NIST:n standardoimiin PQC-algoritmeihin (post-quantum cryptography). Niitä ajetaan TLS- ja IP-verkoissa sekä hybridimalleissa, joissa klassinen ja kvanttiturvallinen salaus toimivat rinnakkain.]]></description>
		<content:encoded><![CDATA[<p><a href="https://etn.fi/index.php/13-news/18469-taeaellae-testataan-kvanttiturvallista-datan-laehetystae" rel="nofollow">https://etn.fi/index.php/13-news/18469-taeaellae-testataan-kvanttiturvallista-datan-laehetystae</a></p>
<p>Kvanttitietokoneet uhkaavat murtaa internetin nykyisen luottamusmallin. Kanadassa tähän varaudutaan jo käytännössä. Québec Cityssä on avattu uusi solmu Kirq-testialustaan, jossa kvanttiturvallista datansiirtoa testataan aidossa verkkoympäristössä.</p>
<p>Testialustaa operoi Numana, joka yhdistää Sherbrooken, Montréalin ja nyt Québec Cityn samaan kvanttiturvalliseen verkkosilmukkaan. Kyse ei ole laboratoriokokeesta, vaan ympäristöstä, joka vastaa oikeaa runko- ja operaattoriverkkoa.</p>
<p>Kvanttiuhka ei kohdistu kaikkeen salaukseen. Symmetrinen salaus, kuten AES, säilyy käyttökelpoisena. Sen sijaan kvanttikoneet pystyvät murtamaan nykyiset asymmetriset menetelmät, joilla hoidetaan avaintenvaihto ja tunnistautuminen.</p>
<p>Juuri tätä Kirqissa testataan. Miten RSA- ja ECC-pohjaiset ratkaisut korvataan ilman, että verkot hajoavat. Käytännössä testaus nojaa NIST:n standardoimiin PQC-algoritmeihin (post-quantum cryptography). Niitä ajetaan TLS- ja IP-verkoissa sekä hybridimalleissa, joissa klassinen ja kvanttiturvallinen salaus toimivat rinnakkain.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/comment-page-6/#comment-1875810</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 10:29:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=58024#comment-1875810</guid>
		<description><![CDATA[Reaaliaikaohjaus ja kvanttiturva samaan mikro-ohjaimeen 
https://etn.fi/index.php/13-news/18783-reaaliaikaohjaus-ja-kvanttiturva-samaan-mikro-ohjaimeen

Microchip tuo dsPIC33A-perheeseen uuden DSC-ohjaimen, joka yhdistää nopean analogian, tarkan reaaliaikaohjauksen ja post-kvanttitietoturvan. Integraation tavoitteena on yksinkertaistaa erityisesti datakeskusten tehonmuunnosta ja moottoriohjausta. Samalla se nostaa esiin kysymyksen siitä, kuinka paljon yhdellä piirillä voidaan oikeasti korvata erilliskomponentteja.

Uusi dsPIC33AK256MPS306 laajentaa Microchipin DSC-valikoimaa suuntaan, jossa yksi ohjainpiiri hoitaa sekä ohjauksen, mittauksen että tietoturvan. Keskeinen muutos on korkean resoluution PWM:n, nopeiden ADC-muuntimien ja kryptokiihdytyksen tuominen samaan pakettiin, mikä tähtää erityisesti datakeskusten tehonsyöttöihin ja korkean taajuuden tehoelektroniikkaan.

Piiri perustuu 200 megahertsin 32-bittiseen ytimeen, jossa on liukulukuyksikkö. Analogiapuoli on poikkeuksellisen raskas: useita 40 MSPS:n 12-bittisiä AD-muuntimia, nopeita komparaattoreita ja DAC-toimintoja. Yhdistelmä mahdollistaa tiheämmät ja nopeammat säätösilmukat esimerkiksi SiC- ja GaN-pohjaisissa teholähteissä, joissa kytkentätaajuudet kasvavat.

Integraation merkitys näkyy erityisesti BOM-kustannuksissa ja layoutissa. Kun mittaus, ohjaus ja osa suojaustoiminnoista saadaan samaan piiriin, ulkoisten komponenttien määrä vähenee.]]></description>
		<content:encoded><![CDATA[<p>Reaaliaikaohjaus ja kvanttiturva samaan mikro-ohjaimeen<br />
<a href="https://etn.fi/index.php/13-news/18783-reaaliaikaohjaus-ja-kvanttiturva-samaan-mikro-ohjaimeen" rel="nofollow">https://etn.fi/index.php/13-news/18783-reaaliaikaohjaus-ja-kvanttiturva-samaan-mikro-ohjaimeen</a></p>
<p>Microchip tuo dsPIC33A-perheeseen uuden DSC-ohjaimen, joka yhdistää nopean analogian, tarkan reaaliaikaohjauksen ja post-kvanttitietoturvan. Integraation tavoitteena on yksinkertaistaa erityisesti datakeskusten tehonmuunnosta ja moottoriohjausta. Samalla se nostaa esiin kysymyksen siitä, kuinka paljon yhdellä piirillä voidaan oikeasti korvata erilliskomponentteja.</p>
<p>Uusi dsPIC33AK256MPS306 laajentaa Microchipin DSC-valikoimaa suuntaan, jossa yksi ohjainpiiri hoitaa sekä ohjauksen, mittauksen että tietoturvan. Keskeinen muutos on korkean resoluution PWM:n, nopeiden ADC-muuntimien ja kryptokiihdytyksen tuominen samaan pakettiin, mikä tähtää erityisesti datakeskusten tehonsyöttöihin ja korkean taajuuden tehoelektroniikkaan.</p>
<p>Piiri perustuu 200 megahertsin 32-bittiseen ytimeen, jossa on liukulukuyksikkö. Analogiapuoli on poikkeuksellisen raskas: useita 40 MSPS:n 12-bittisiä AD-muuntimia, nopeita komparaattoreita ja DAC-toimintoja. Yhdistelmä mahdollistaa tiheämmät ja nopeammat säätösilmukat esimerkiksi SiC- ja GaN-pohjaisissa teholähteissä, joissa kytkentätaajuudet kasvavat.</p>
<p>Integraation merkitys näkyy erityisesti BOM-kustannuksissa ja layoutissa. Kun mittaus, ohjaus ja osa suojaustoiminnoista saadaan samaan piiriin, ulkoisten komponenttien määrä vähenee.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/08/06/post-quantum-cryptography/comment-page-6/#comment-1875055</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 10:23:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=58024#comment-1875055</guid>
		<description><![CDATA[Filippo Valsorda:
A cryptography engineer calls for urgent rollout of post-quantum cryptography schemes, saying the risk of inaction is now unacceptable, after Google&#039;s warning

A Cryptography Engineer’s Perspective on Quantum Computing Timelines
https://words.filippo.io/crqc-timeline/

My position on the urgency of rolling out quantum-resistant cryptography has changed compared to just a few months ago. You might have heard this privately from me in the past weeks, but it’s time to signal and justify this change of mind publicly.

There had been rumors for a while of expected and unexpected progress towards cryptographically-relevant quantum computers, but over the last week we got two public instances of it.

First, Google published a paper revising down dramatically the estimated number of logical qubits and gates required to break 256-bit elliptic curves like NIST P-256 and secp256k1, which makes the attack doable in minutes on fast-clock architectures like superconducting qubits. They weirdly1 frame it around cryptocurrencies and mempools and salvaged goods or something, but the far more important implication are practical WebPKI MitM attacks.]]></description>
		<content:encoded><![CDATA[<p>Filippo Valsorda:<br />
A cryptography engineer calls for urgent rollout of post-quantum cryptography schemes, saying the risk of inaction is now unacceptable, after Google&#8217;s warning</p>
<p>A Cryptography Engineer’s Perspective on Quantum Computing Timelines<br />
<a href="https://words.filippo.io/crqc-timeline/" rel="nofollow">https://words.filippo.io/crqc-timeline/</a></p>
<p>My position on the urgency of rolling out quantum-resistant cryptography has changed compared to just a few months ago. You might have heard this privately from me in the past weeks, but it’s time to signal and justify this change of mind publicly.</p>
<p>There had been rumors for a while of expected and unexpected progress towards cryptographically-relevant quantum computers, but over the last week we got two public instances of it.</p>
<p>First, Google published a paper revising down dramatically the estimated number of logical qubits and gates required to break 256-bit elliptic curves like NIST P-256 and secp256k1, which makes the attack doable in minutes on fast-clock architectures like superconducting qubits. They weirdly1 frame it around cryptocurrencies and mempools and salvaged goods or something, but the far more important implication are practical WebPKI MitM attacks.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
