Sensitive data must be kept private for as long as it is in use and often for some time afterwards. Examples include medical, legal and financial data, as well as intellectual property and survey data.
Sensitive data must be kept private for as long as it is in use and often for some time afterwards. Examples include medical, legal and financial data, as well as intellectual property and survey data.
The relationship between time-dependent sensitivity, the time until cryptographically relevant quantum computers become available and the time left to prepare for them are described by Mosca's theorem.
If the combined transition time for your system and sensitivity span of your data is greater than the time until the quantum computer threat arrives then the privacy of your data will be in danger
We won't know when cryptographically relevant quantum computers do become available to malicious actors because they will just quietly use them without announcement!
Q-day is unknowable, even after it arrives: We won't know when cryptographically relevant quantum computers do become available to malicious actors because they will just quietly use them without announcement!
Keywords: #cyber security, #post-quantum cybersecurity
Search: #Mosca's theorem
Copyrights 2025 | Schrocat Security™ | Terms & Conditions