The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (2018 vol. 16)
ISSN: 1540-7993
pp: 86-88
Bruce Schneier , Harvard University
Maybe the whole idea of number theory–based encryption, which is what our modern public-key systems are, is a temporary detour based on our incomplete model of computing. Now that our model has expanded to include quantum computing, we might end up back to where we were in the late 1970s and early 1980s: symmetric cryptography, code-based cryptography, Merkle hash signatures. That would be both amusing and ironic.
security, cryptography, quantum cryptography, postquantum

B. Schneier, "Cryptography after the Aliens Land," in IEEE Security & Privacy, vol. 16, no. 5, pp. 86-88, 2018.
92 ms
(Ver 3.3 (11022016))