In this article, the author asserts the following:
- (1) Cryptographic algorithms are widely used to maintain the safety and privacy of communications. Many modern technologies, including mobile telephones, would fail if the applied cryptographic algorithm was “broken” by attackers. Private and public keys are often used in a typical cryptographic implementation.
- (2) An attacker’s capacity for successful invasion depends upon the availability of fast-enough-to-decipher private keys. The recent advent of quantum computers based on multiple states instead of binary states heralds forthcoming faster computers with the capacity to break current algorithms. This would surely require reworking with regards to cryptographic algorithms and their implementing systems. Given the spread of cryptosystems, it is a mammoth task.
- (3) As progress in computer technologies and the development of cryptosystems are independent of each other, the National Institute of Standards and Technology (NIST) has started work on post-quantum cryptography (PQC) system standardization.
The author subsequently identifies several known and unknown issues. As the title suggests, this will certainly be a long march to the end goal.