With the power of quantum computing, how will we defend it against the cracking of complex passwords?

With the power of quantum computing, how will we defend it against the cracking of complex passwords?

Attached: maxresdefault (5).jpg (1920x1080, 123K)

Other urls found in this thread:

openquantumsafe.org
en.wikipedia.org/wiki/Post-quantum_cryptography
twitter.com/NSFWRedditVideo

just make them even more complex

Attached: 1372124262172.jpg (554x439, 65K)

Just use quantum encryption.

It can only halve the complexity, so it's basically not worth worrying about.

I need a quick rundown on quantum computing and how it differs from normal computers

Normal computers exist today and can solve actual problems quickly. Quantum computers may or may not exist and in any case can't solve any problems usefully yet, and maybe never will. They might be a scam altogether.

openquantumsafe.org

>open quantum safe
>open safe
A name you can trust.

>The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem.

Basically you're fucked. For all we know they could be in use secretly right now.

>All of these problems can be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat.

en.wikipedia.org/wiki/Post-quantum_cryptography

The one time pad is fundamentally uncrackable, but you must keep the key a secret.

>cracking of complex passwords
Literally the easiest thing to defend against. Cracking passwords is O(N) on normal computers, while it is only O(sqrt(N)) on quantum computers, where N is the number of possible passwords (e.g. 2^128 for a 128-bit password). This means that cracking a 128-bit password with a quantum computer is like cracking a 64-bit password on a normal one, because sqrt(2^128) = 2^64. The solution is therefore pretty simple: just ~double the length of your password/hash and you're good to go.

it only affects public key crypto.
literally everything else is safe

nice

Attached: RLKnOCE.jpg (413x413, 48K)

t. brainlet

Attached: brainlet.png (207x243, 7K)

Or just lock them out after 3 attempts
simpler shit, really

Why does this computer makes a soiboi expression face lmao?

soiboyism is a parasitical disease

Hashes are usually obtained through database leaks, and crackers are free to do whatever they want with them until they manage to compute the password to use in the actual service.

No, you're the brainlet. FYI, the greatest amount of completely entangled qubits we've reached so far is 20.

Quantum computers encode the states 1 and 0 into some quantum phenomenon, such as the spin of an electron or polarization of photons. While in a quantum state qubit can exist in superposition as a probability distribution of whether or not it will be 1 or 0 once you measure it. Quantum entanglement allows qubits to affect the results of other qubits, this allows you to expoentially increase the number of possible superpositions. The difference between classical bits and qubits is that with 2 classical bits you can have possible states 00, 01, 10, 11 but can only be in one of those given states at any given time. Qubits that are entangled can be in any of those states but through superposition they can exist as some probability to measuring every single one of those states. Quantum parallelism applies because performing an operation on a system operates on every single possible superposition at the same time. The goal in quantum algorithms is generally to make the probability of one solution dominate the others so you can run every operation in parallel and the result will be the correct answer with high probability.

Quantum computers are still years off because they're really difficult to work with. They need to be under radiation shielding, magnetic shielding, and kept at about 0.015 Kelvin to maintain quantum state. Also quantum computing is challenging because all of the operations need to be reversible (Because if you can't reverse physics nothing makes sense. Imagine throwing a ball somewhere and not being able to throw it back). So normal boolean gates don't work because .

Qubits aren't ordinary bits. With every additional qubit, the computational power of the machine doubles.

Unicode passwords

A 128 qubit computer can crack that in O(1)

>So normal boolean gates don't work because .
user...? You alright?

Attached: e82cb4aeb5db247b2706b1e9c906b2aeba2010ee46bfe81a41fa1f4e4c881e7b.png (500x459, 334K)