Quantum Computers Enhance Data Security
This is a news story, published by Live Science, that relates primarily to quantum news.
physics news
For more physics news, you can click here:
more physics newsLive Science news
For more news from Live Science, you can click here:
more news from Live ScienceAbout the Otherweb
Otherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best science news, business news, entertainment news, and much more. If you like physics news, you might also like this article about
Quantum computers. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest Quantum computer news, powerful quantum computer news, physics news, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
powerful quantum computersLive Science
•Science
Science
Quantum computers are on the verge of hacking most cybersecurity algorithms. Can we stop them?

86% Informative
Quantum computers harness quantum mechanical effects to process and store data in a form beyond digital bits.
These "quantum bits" — or qubits — could open up massive computing power.
But this massive power also may give hackers the upper hand.
Cryptographers need to come up with ways to protect data from powerful quantum computers.
Experts believe lattice problems will be hard for a quantum computer to crack because they don't rely on factoring massive numbers.
The fourth problem belongs to a group called hash functions.
Hash functions work by taking the virtual key for unlocking a specific point on a data table, scrambling that key and compressing it into a shorter code.
There's also the threat of "harvest-now, decrypt-later" attacks.
Malicious actors can scoop up encrypted data and save it until they have access to a quantum computer that's capable of cracking the encryption.
The arms race between hackers and security professionals will continue to evolve well into the future.
VR Score
88
Informative language
89
Neutral language
48
Article tone
semi-formal
Language
English
Language complexity
58
Offensive language
not offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
not detected
Time-value
long-living
External references
13
Source diversity
11
Affiliate links
no affiliate links
Small business owner?