{"id":119,"date":"2016-07-11T12:46:57","date_gmt":"2016-07-11T12:46:57","guid":{"rendered":"http:\/\/blog.onclickinnovations.com\/?p=119"},"modified":"2016-08-02T06:18:46","modified_gmt":"2016-08-02T06:18:46","slug":"quantum-cryptography","status":"publish","type":"post","link":"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/","title":{"rendered":"Quantum Cryptography"},"content":{"rendered":"<p>Quantum computing is a tough concept to get your head around ,the simplified version is that quantum computers use the principles of quantum physics, which governs the behavior of subatomic particles, to perform tasks faster than a transistor-based computer. So post-quantum cryptography simply means secure against attacks by a quantum computer.\u00a0Specifically, Google is using a promising post-quantum algorithm called New Hope. Google is using it on top of the existing crypto algorithm, in case New Hope turns out to be breakable with today&#8217;s computers.\u00a0The post-quantum algorithm protects you from hackers from the future, but it might be vulnerable against today&#8217;s machines. Conversely, the elliptic-curve algorithm Google is normally using might be worthless against future&#8217;s quantum computers, but it&#8217;s the best option against the computers of today.<\/p>\n<p>For years, experts have warned users to use secure browser communications whenever possible. If you visit a site and the URL in your browser&#8217;s address bar starts with &#8220;https:\/\/&#8221;, you know the communication between your computer and the server is encrypted.\u00a0But that encryption, according to Google, has a potential weakness. If quantum computers \u00a0get sufficiently powerful in the future, they could be used to break TLS, the cryptographic protocol that&#8217;s one of the foundations of HTTPS.\u00a0 A future quantum computer might be able to retroactively decrypt today&#8217;s internet communications. So Google is addressing the problem today by testing a post-quantum key exchange algorithm in Chrome, which should ideally protect from such future attempts.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quantum computing is a tough concept to get your head around ,the simplified version is that quantum computers use the principles of quantum physics, which governs the behavior of subatomic particles, to perform tasks faster than a transistor-based computer. So post-quantum cryptography simply means secure against attacks by a quantum computer.\u00a0Specifically, Google is using a &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/\"> <span class=\"screen-reader-text\">Quantum Cryptography<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":2,"featured_media":120,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[1],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quantum Cryptography | Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum Cryptography | Blog\" \/>\n<meta property=\"og:description\" content=\"Quantum computing is a tough concept to get your head around ,the simplified version is that quantum computers use the principles of quantum physics, which governs the behavior of subatomic particles, to perform tasks faster than a transistor-based computer. So post-quantum cryptography simply means secure against attacks by a quantum computer.\u00a0Specifically, Google is using a &hellip; Quantum Cryptography Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/officialonclick\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-11T12:46:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-08-02T06:18:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/onclickinnovations.com\/blog\/wp-content\/uploads\/2016\/07\/quantum.jpg?fit=277%2C182&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"277\" \/>\n\t<meta property=\"og:image:height\" content=\"182\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kavita Arora\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OnClick_web\" \/>\n<meta name=\"twitter:site\" content=\"@OnClick_web\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kavita Arora\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/\",\"url\":\"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/\",\"name\":\"Quantum Cryptography | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/onclickinnovations.com\/blog\/#website\"},\"datePublished\":\"2016-07-11T12:46:57+00:00\",\"dateModified\":\"2016-08-02T06:18:46+00:00\",\"author\":{\"@id\":\"https:\/\/onclickinnovations.com\/blog\/#\/schema\/person\/ba3ed611007952683830a055469e831c\"},\"breadcrumb\":{\"@id\":\"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/onclickinnovations.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quantum Cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/onclickinnovations.com\/blog\/#website\",\"url\":\"https:\/\/onclickinnovations.com\/blog\/\",\"name\":\"Blog - OnclickInnovations Pvt. Ltd.\",\"description\":\"Onclick Innovations Pvt. Ltd.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/onclickinnovations.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/onclickinnovations.com\/blog\/#\/schema\/person\/ba3ed611007952683830a055469e831c\",\"name\":\"Kavita Arora\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onclickinnovations.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a0ee6f19fb45d91e456bfdfb6920112f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a0ee6f19fb45d91e456bfdfb6920112f?s=96&d=mm&r=g\",\"caption\":\"Kavita Arora\"},\"url\":\"https:\/\/onclickinnovations.com\/blog\/author\/divya\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum Cryptography | Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"Quantum Cryptography | Blog","og_description":"Quantum computing is a tough concept to get your head around ,the simplified version is that quantum computers use the principles of quantum physics, which governs the behavior of subatomic particles, to perform tasks faster than a transistor-based computer. So post-quantum cryptography simply means secure against attacks by a quantum computer.\u00a0Specifically, Google is using a &hellip; Quantum Cryptography Read More &raquo;","og_url":"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/officialonclick\/","article_published_time":"2016-07-11T12:46:57+00:00","article_modified_time":"2016-08-02T06:18:46+00:00","og_image":[{"width":277,"height":182,"url":"https:\/\/i0.wp.com\/onclickinnovations.com\/blog\/wp-content\/uploads\/2016\/07\/quantum.jpg?fit=277%2C182&ssl=1","type":"image\/jpeg"}],"author":"Kavita Arora","twitter_card":"summary_large_image","twitter_creator":"@OnClick_web","twitter_site":"@OnClick_web","twitter_misc":{"Written by":"Kavita Arora","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/","url":"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/","name":"Quantum Cryptography | Blog","isPartOf":{"@id":"https:\/\/onclickinnovations.com\/blog\/#website"},"datePublished":"2016-07-11T12:46:57+00:00","dateModified":"2016-08-02T06:18:46+00:00","author":{"@id":"https:\/\/onclickinnovations.com\/blog\/#\/schema\/person\/ba3ed611007952683830a055469e831c"},"breadcrumb":{"@id":"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/onclickinnovations.com\/blog\/quantum-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/onclickinnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Quantum Cryptography"}]},{"@type":"WebSite","@id":"https:\/\/onclickinnovations.com\/blog\/#website","url":"https:\/\/onclickinnovations.com\/blog\/","name":"Blog - OnclickInnovations Pvt. Ltd.","description":"Onclick Innovations Pvt. Ltd.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/onclickinnovations.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/onclickinnovations.com\/blog\/#\/schema\/person\/ba3ed611007952683830a055469e831c","name":"Kavita Arora","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onclickinnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a0ee6f19fb45d91e456bfdfb6920112f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0ee6f19fb45d91e456bfdfb6920112f?s=96&d=mm&r=g","caption":"Kavita Arora"},"url":"https:\/\/onclickinnovations.com\/blog\/author\/divya\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/onclickinnovations.com\/blog\/wp-content\/uploads\/2016\/07\/quantum.jpg?fit=277%2C182&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pe8hCy-1V","jetpack-related-posts":[{"id":1157,"url":"https:\/\/onclickinnovations.com\/blog\/reasons-to-prefer-angularjs-for-frontend-web-development\/","url_meta":{"origin":119,"position":0},"title":"Reasons to prefer AngularJS for Frontend Web Development","author":"Rohit Sharma","date":"January 16, 2019","format":false,"excerpt":"The world is moving fast and to catch up, we have to be competitive to meet the standards. The modern era is predominantly dependent on rapidly evolving technology and your sustainability can only be assured through early adaptation to the web world. A powerful web application or a website is\u2026","rel":"","context":"In &quot;Custom Software Development Solutions&quot;","block_context":{"text":"Custom Software Development Solutions","link":"https:\/\/onclickinnovations.com\/blog\/category\/custom-software-development-solutions\/"},"img":{"alt_text":"hire angularjs developers","src":"https:\/\/i0.wp.com\/blog.onclickinnovations.com\/wp-content\/uploads\/2019\/01\/Frontend-angular.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.onclickinnovations.com\/wp-content\/uploads\/2019\/01\/Frontend-angular.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/blog.onclickinnovations.com\/wp-content\/uploads\/2019\/01\/Frontend-angular.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/blog.onclickinnovations.com\/wp-content\/uploads\/2019\/01\/Frontend-angular.jpg?resize=700%2C400 2x"},"classes":[]},{"id":445,"url":"https:\/\/onclickinnovations.com\/blog\/google-rankbrain\/","url_meta":{"origin":119,"position":1},"title":"Google   RankBrain","author":"Kavita Arora","date":"November 1, 2016","format":false,"excerpt":"GOOGLE RANKBRAIN is primarily targeted at improving Google\u2019s ability to infer the intent of search users. The aspect of RankBrain which sets it apart from previous algorithm updates is its machine learning underpinnings. This architecture enables it to automatically refine itself over time. But how does RankBrain analyse sites at\u2026","rel":"","context":"In &quot;Custom Software Development Solutions&quot;","block_context":{"text":"Custom Software Development Solutions","link":"https:\/\/onclickinnovations.com\/blog\/category\/custom-software-development-solutions\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":122,"url":"https:\/\/onclickinnovations.com\/blog\/social-media-optimization-smo\/","url_meta":{"origin":119,"position":2},"title":"Social Media Optimization ( SMO )","author":"Kavita Arora","date":"July 12, 2016","format":false,"excerpt":"Social Media is also the Back Bone of Digital Marketing. Along with Facebook, Twitter that we need to set strategy to reach our audiences. And also need to choose which social media suits our industry. To be successful in Digital Marketing activities , we need to use both SEO &\u2026","rel":"","context":"In &quot;Custom Software Development Solutions&quot;","block_context":{"text":"Custom Software Development Solutions","link":"https:\/\/onclickinnovations.com\/blog\/category\/custom-software-development-solutions\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":963,"url":"https:\/\/onclickinnovations.com\/blog\/putting-all-about-cryptocurrency-in-perspective-hire-cryptocurrency-developers\/","url_meta":{"origin":119,"position":3},"title":"Putting all about cryptocurrency in perspective &#8211; hire cryptocurrency developers","author":"Rohit Sharma","date":"July 30, 2018","format":false,"excerpt":"Smartphones have indeed taken over this world by a whirlwind. No wonder, man is in awe of the benefits these gadgets and the internet is providing. Among all other stuff, one word that has been occupying minds of the people is to hire cryptocurrency developers. In layman terms, cryptocurrency is\u2026","rel":"","context":"In &quot;Cryptocurrency developers&quot;","block_context":{"text":"Cryptocurrency developers","link":"https:\/\/onclickinnovations.com\/blog\/category\/cryptocurrency-developers\/"},"img":{"alt_text":"hire cryptocurrency developers","src":"https:\/\/i0.wp.com\/blog.onclickinnovations.com\/wp-content\/uploads\/2018\/07\/Cryptocurrency_featured2.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.onclickinnovations.com\/wp-content\/uploads\/2018\/07\/Cryptocurrency_featured2.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/blog.onclickinnovations.com\/wp-content\/uploads\/2018\/07\/Cryptocurrency_featured2.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/blog.onclickinnovations.com\/wp-content\/uploads\/2018\/07\/Cryptocurrency_featured2.jpg?resize=700%2C400 2x, https:\/\/i0.wp.com\/blog.onclickinnovations.com\/wp-content\/uploads\/2018\/07\/Cryptocurrency_featured2.jpg?resize=1050%2C600 3x, https:\/\/i0.wp.com\/blog.onclickinnovations.com\/wp-content\/uploads\/2018\/07\/Cryptocurrency_featured2.jpg?resize=1400%2C800 4x"},"classes":[]},{"id":661,"url":"https:\/\/onclickinnovations.com\/blog\/hadoop\/","url_meta":{"origin":119,"position":4},"title":"Hadoop","author":"Kavita Arora","date":"April 3, 2017","format":false,"excerpt":"Apache Hadoop\u00a0is the most popular and powerful big data tool, Hadoop provides world\u2019s most reliable storage layer, a batch Processing engine \u00a0and a Resource Management Layer . \u00a0HADOOP\u00a0can be further explained as below :: \u00a0 Open-source\u2013 Apache Hadoop is an open source project. It means its code can be modified\u2026","rel":"","context":"In &quot;Custom Software Development Solutions&quot;","block_context":{"text":"Custom Software Development Solutions","link":"https:\/\/onclickinnovations.com\/blog\/category\/custom-software-development-solutions\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":385,"url":"https:\/\/onclickinnovations.com\/blog\/swift\/","url_meta":{"origin":119,"position":5},"title":"Swift :: App Development","author":"Kavita Arora","date":"October 4, 2016","format":false,"excerpt":"Developers find themselves battling to choose between Objective-C and SWIFT\u00a0as both the languages are fiercest competitors nowadays. Still many of the views showed \u00a0that Swift is better as compared to Objective-C. It is easy to read due to fact that it has less codes. Typically Swift can help reduce lines\u2026","rel":"","context":"In &quot;Custom Software Development Solutions&quot;","block_context":{"text":"Custom Software Development Solutions","link":"https:\/\/onclickinnovations.com\/blog\/category\/custom-software-development-solutions\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/onclickinnovations.com\/blog\/wp-content\/uploads\/2016\/10\/swift.jpg?fit=512%2C267&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/posts\/119"}],"collection":[{"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=119"}],"version-history":[{"count":1,"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/posts\/119\/revisions"}],"predecessor-version":[{"id":121,"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/posts\/119\/revisions\/121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/media\/120"}],"wp:attachment":[{"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onclickinnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}