1,126
edits
m (Minor corrections and additions) |
|||
| Line 7: | Line 7: | ||
== Background == | == Background == | ||
Quantum Computing has the potential to disrupt IT security by making it feasible to crack the current state-of-the-art in encryption technology. Recently, cryptographic libraries have started to implement 'post quantum' computing ("PQC") methods -- that is, encryption that is resistant to the types of attacks that are | Quantum Computing has the potential to disrupt IT security by making it feasible to crack the current state-of-the-art in encryption technology. Recently, cryptographic libraries have started to implement 'post quantum' computing ("PQC") methods -- that is, encryption that is resistant to the types of attacks that quantum computing enables. These changes are being made out of an abundance of caution, as there are no current encryption methods at risk of being cracked by state-of-the-art quantum computers. | ||
== Changes == | == Changes == | ||