{"id":31408,"date":"2019-03-13T03:42:21","date_gmt":"2019-03-13T07:42:21","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31408"},"modified":"2019-03-13T03:42:21","modified_gmt":"2019-03-13T07:42:21","slug":"securing-the-internet-of-things-in-the-quantum-age","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/03\/13\/securing-the-internet-of-things-in-the-quantum-age\/","title":{"rendered":"Securing the \u201cinternet of things\u201d in the quantum age"},"content":{"rendered":"\n<p>MIT researchers have developed a novel cryptography circuit that can be used to protect low-power \u201c<strong>internet of things<\/strong>\u201d (<strong>IoT<\/strong>) devices in the coming age of quantum computing.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/03\/MIT-Cryptography-Chip_0.jpg\" alt=\"\" class=\"wp-image-31409\" width=\"258\" height=\"163\"\/><\/figure><\/div>\n\n\n\n<p>Quantum computers can in principle execute calculations that today are practically impossible for classical computers. Bringing quantum computers online and to market could one day enable advances in medical research, drug discovery, and other applications. But there\u2019s a catch: If hackers also have access to quantum computers, they could potentially break through the powerful encryption schemes that currently protect data exchanged between devices.<\/p>\n\n\n\n<p>Today\u2019s most promising quantum-resistant encryption scheme is called \u201clattice-based cryptography,\u201d which hides information in extremely complicated mathematical structures. To date, no known quantum algorithm can break through its defenses. But these schemes are way too computationally intense for<strong> IoT<\/strong> devices, which can only spare enough energy for simple data processing.  R<a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=http:\/\/news.mit.edu\/2019\/securing-internet-things-in-quantum-age-0301&amp;ct=ga&amp;cd=CAEYASoUMTM2MDAyMTc0NTY4MzAyODQzMzgyGmEyZDc1YTAxNDlhODIxZDc6Y29tOmVuOlVT&amp;usg=AFQjCNG6r2znulVGfrLr5VyP-thnQC2GKw\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ead more: <\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>MIT researchers have developed a novel cryptography circuit that can be used to protect low-power \u201cinternet of things\u201d (IoT) devices in the coming age of quantum computing. Quantum computers can in principle execute calculations that today are practically impossible for <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/03\/13\/securing-the-internet-of-things-in-the-quantum-age\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[649,626],"tags":[650,627],"class_list":["post-31408","post","type-post","status-publish","format-standard","hentry","category-internet-of-things","category-iot","tag-internet-of-things","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31408"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31408\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}