Menu
Google hopes to thwart quantum computers from cracking today's Internet encryption

Google hopes to thwart quantum computers from cracking today's Internet encryption

Google is testing out new cryptography that could future-proof Internet communications

The encryption methods used to secure today’s Internet communications won’t be impenetrable forever. More powerful “quantum computers” on the horizon could very well crack them.

That’s why Google is testing out new cryptography that computers in the future might not be able to break.

The processing power offered by "hypothetical, future" quantum computers could be enough to “decrypt any internet communication that was recorded today,” wrote Matt Braithwaite, a Google software engineer in a company blog post on Thursday.

This could affect the Transport Layer Security (TLS) protocol used when visiting websites. Old information, originally meant to be secured for decades, could suddenly become exposed, he added.

The quantum computers available today, however, are still small and experimental, but the tech industry has been moving closer to making them a mainstream reality.

They represent a leap over current computers, which rely on data represented as 0s and 1s. Quantum computers, on the other hand, use qubits that can simultaneously be both 0 and 1, which can help them run far more efficiently.

Regardless of when quantum computers arrive, Google still wants to prepare for the security risks posed by them.

To future-proof today’s Internet communications, the search giant will deploy what it’s calling “post-quantum cryptography” and will test it using its browser Chrome Canary.

The experiment will only cover a small fraction of the connections between the browser and Google’s servers, and be used on top of its current encryption algorithm.

In its test, Google is using a cryptography algorithm called “New Hope." However, the test will only last two years, and Google hopes it can replace the algorithm with something better.

“The post-quantum algorithm might turn out to be breakable even with today's computer,” Braithwaite wrote. “Alternatively, if the post-quantum algorithm turns out to be secure then it'll protect the connection even against a future, quantum computer."

Users of Chrome Canary can tell if the post-quantum algorithm is in use by checking the browser's security panel and looking for "CECPQ1" in the key exchange.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags security

Featured

Slideshows

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

​Ingram Micro’s Hooked on Lenovo incentive programme recently rewarded 28 of New Zealand's top performing resellers with a full-on fishing trip at Great Barrier Island for the third year​ in a row.

Tight lines as Hooked on Lenovo catches up at Great Barrier Island
Inside the AWS Summit in Sydney

Inside the AWS Summit in Sydney

As the dust settles on the 2017 AWS Summit in Sydney, ARN looks back an action packed two-day event, covering global keynote presentations, 80 breakout sessions on the latest technology solutions, and channel focused tracks involving local cloud stories and insights.

Inside the AWS Summit in Sydney
Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Ingram Micro hosted its third annual Cure Kids Charity Golf Tournament at the North Shore Golf Club in Auckland. In total, 131 resellers, vendors and Ingram Micro suppliers enjoyed a round of golf consisting of challenges on each of the 18 sponsored holes, with Team Philips taking out the top honours.

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day
Show Comments