Shaw showed in 19 94 how a quantum computer should be able to factor large numbers into primes expedientially faster than a classical computer can. One of the steps in shaw's tum algarism can efficiently break an elliptic curve key, too. The technology has also spread beyond cibes base. For example, the radio frequency chips in everything from credit cards to security passes typically use elliptic curve algaritms.
Almost everything we do on the Internet is made possible by cryptographic algorithms, which scramble our data to protect our privacy. However, this privacy could be under threat. If quantum computers reach their potential these machines could crack current encryption systems — leaving our online data vulnerable.
To limit the damage of this so called 'Q-day', researchers are racing to develop new cryptographic systems, capable of withstanding a quantum attack.
This is an audio version of our feature: The race to save the Internet from quantum hackers
Never miss an episode: Subscribe to the Nature Podcast on Apple Podcasts, Google Podcasts, Spotify or your favourite podcast app. Head here for the Nature Podcast RSS feed
Hosted on Acast. See acast.com/privacy for more information.