Nobody really knows for sure, but there is one thing you can be sure of, there are quantum computers out there right now as we speak. The ones that we definitely know of are D-wave systems quantum computers, which are commercially available and has several big name clients who have purchased a computer from them. There's really nothing to worry about as far as quantum computers go because they are an infant technology and are limited to specific functions on;y, but the real trouble starts when they gain more general function, that's when you arrive at the realization that the existing encryption is on it's way out the door, old news, good bye.
Really, i only knew that one from you. If that was reslly then it would be amazing somehow because we dont need to worry more. Base on my research most people really dont know if encryotion will last or not because no one controls it.
-----------------
Information about the existence and use of working quantum computers - can not be publicly available, because in the world there is a global information confrontation, cyberwar.
And like any war, there are secrets, secret developments.
Why do we always expect to be told everything, informed?
No, of course not.
Here's an example that confirms my speculation:
"Speculation on the subject intensified when NASA published a document on the site, but soon deleted (a copy available to ForkLog) a document with insider information about Google's success in the direction of the existence of a working model of a quantum computer and the company's achievement of "quantum superiority". In the media, the information was replicated by the authoritative British publication The Financial Times.
And it's still unclear why cryptography was separated:
- one cryptography for all of us;
- a second cryptography that we don't have access to.
Commercial cryptography must be based on the same standards around the world.
But state standards for cryptography are much better, they cannot be distributed anywhere, they will only be used within state structures.
And despite the high level of protection of state cryptography, they must be updated every five years (at the algorithmic level).
Then it is even more interesting.
Commercial structures should not have access to this algorithm itself. Thus, it will be possible to apply simultaneously public "commercial" algorithms - for us, simple and naive, and completely different algorithms for the chosen ones.
Of course, skeptics will immediately argue that state secrets are very serious, so the cryptography is different.
My answer to this is this: why, then, at the NIST open competition, which is held on the post quantum encryption systems, starting from 2015, are not accepted systems based on the same principles as modern RSA and ECC?
1. There was no direct threat from quantum computers back then.
2. Even then (2015) leading experts in cryptography warned that no key length would save modern commercial systems if at least one was cracked. This is a hidden explanation of the fact that these systems are afraid not of Shore algorithms, which only simplify the complete search for the key, but the achievements of cryptanalysis.
3. Why all ECC patents from Koblitz and Menezes, previously purchased by the NSA, were forgotten without explanation when the results of research by UK mathematicians became known in 2016. This study was ordered by the NSA itself.
Koblitz and Menezes have every reason to consider themselves competent in the field of cryptography on elliptic curves, but they did not hear absolutely anything about new hacking methods that compromised "their" crypto scheme. So everything that happens around ECC amazed mathematicians extremely.
People who have close contacts with this industry know that large corporations that provide cryptographic tasks and equipment for the US government always get some kind of advance warning about changing plans. But in this case there was nothing of the kind.
Even more unexpected was the fact that no one from the NSA addressed the people from NIST (USA), who are responsible for the open cryptographic standards of the state.
The ETSI/IQC International Symposium on Quantum Secure Cryptography (in 2016), from which this story began, has several notable features.
Firstly, it was very solidly represented by the heads of important structures, special services of Great Britain, Canada, Germany. All these national special services are analogues of the American NSA. However, absolutely no one was mentioned explicitly from the NSA. And this, of course, is not an accident.
This event is interesting for the reason that there was a highly unusual report on behalf of the secret British secret service GCHQ (P. Campbell, M. Groves, D. Shepherd, "Soliloquy: A Cautionary Tale"). This is a report from the CESG information security division, which was personally made by Michael Groves, who leads cryptographic research at this intelligence agency.
It must be emphasized here that it is completely uncharacteristic for people from the British special services to talk about their secret developments at open conferences. However, this case was truly exceptional.
The story of the great cryptographer CESG speaking at the public symposium was extremely sparsely covered in the media, and the slides of articles and presentations about Soliloquide can only be found on the Web for those who know very clearly what they are looking for (on the ETSI website, where these files are exclusively found, there are no direct links to them).
Details can be found here, second post dated December 04:
https://bitcointalk.org/index.php?topic=5204368.40.
For these reasons, we conclude that there may be both unknown quantum devices and a secret mathematical apparatus that unambiguously compromises all modern commercial asymmetric cryptography.