Menu
Google hopes to thwart quantum computers from cracking today's Internet encryption

Google hopes to thwart quantum computers from cracking today's Internet encryption

Google is testing out new cryptography that could future-proof Internet communications

The encryption methods used to secure today’s Internet communications won’t be impenetrable forever. More powerful “quantum computers” on the horizon could very well crack them.

That’s why Google is testing out new cryptography that computers in the future might not be able to break.

The processing power offered by "hypothetical, future" quantum computers could be enough to “decrypt any internet communication that was recorded today,” wrote Matt Braithwaite, a Google software engineer in a company blog post on Thursday.

This could affect the Transport Layer Security (TLS) protocol used when visiting websites. Old information, originally meant to be secured for decades, could suddenly become exposed, he added.

The quantum computers available today, however, are still small and experimental, but the tech industry has been moving closer to making them a mainstream reality.

They represent a leap over current computers, which rely on data represented as 0s and 1s. Quantum computers, on the other hand, use qubits that can simultaneously be both 0 and 1, which can help them run far more efficiently.

Regardless of when quantum computers arrive, Google still wants to prepare for the security risks posed by them.

To future-proof today’s Internet communications, the search giant will deploy what it’s calling “post-quantum cryptography” and will test it using its browser Chrome Canary.

The experiment will only cover a small fraction of the connections between the browser and Google’s servers, and be used on top of its current encryption algorithm.

In its test, Google is using a cryptography algorithm called “New Hope." However, the test will only last two years, and Google hopes it can replace the algorithm with something better.

“The post-quantum algorithm might turn out to be breakable even with today's computer,” Braithwaite wrote. “Alternatively, if the post-quantum algorithm turns out to be secure then it'll protect the connection even against a future, quantum computer."

Users of Chrome Canary can tell if the post-quantum algorithm is in use by checking the browser's security panel and looking for "CECPQ1" in the key exchange.


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags security

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments