Informationwekk.com – 7/9/2016
Google Testing Post-Quantum Cryptography For Chrome
Google is testing out post-quantum cryptography in a move to guard against hackers who may one day use quantum computers to break the security protocol used in HTTPS.
Although quantum computers are still small and experimental, Google is looking down the road to a time when quantum computers could be used to break the asymmetric cryptographic primitives that are used in TLS, which when used to secure HTTP constitutes the HTTPS protocol. Cryptographic primitives that can stay secure against quantum computers are known collectively as post-quantum cryptography.
"A hypothetical, future quantum computer would be able to retrospectively decrypt any Internet communication that was recorded today, and many types of information need to remain confidential for decades. Thus even the possibility of a future quantum computer is something that we should be thinking about today," Matt Braithwaite, a Google software engineer, said in a Google Security blog.
In an effort to guard against those potential hacks in the future, Google is now testing out post-quantum cryptography.
The test involves using the current encryption algorithm, an elliptic-curve key-exchange, which is used in Google's desktop Chrome browsers and a second, and experimental, post-quantum key-exchange algorithm.
Google notes that by layering the experimental algorithm over the existing one, if the experiment fails, the older algorithm will still be in place to provide security.
"Alternatively, if the post-quantum algorithm turns out to be secure then it'll protect the connection even against a future quantum computer," Braithwaite said.
Quantum computers are designed to leverage certain aspects of quantum physics to solve problems much faster than a traditional computer. The quantum computers used today are experimental and only use a small number of quantum bits (qubits). Google, with its D-Wave computer, which it operates with NASA, is working on developing a computer that can accommodate a larger number of qubits. Microsoft, IBM, Intel and others are also working on developing larger quantum computers.
Google's D-Wave computer can combine the benefits of digital and analog systems for quantum computing. The digital approach provides robust error correction, however it requires custom algorithms, whereas the analog method can be generalized and deal with various algorithms in an easier fashion. But analog quantum computing is limited by errors accumulating in the system and other factors.
Google is calling its quantum security experiment Chrome Canary. Users curious to know whether it's in use in their browser can check the Chrome menu and go to "developer tools." On the left-hand side, under "Main Origin," users can click on the developers.google.com link. Then, on the right-hand side in the box marked "Connection," users should find the word "Key Exchange" and see if it says "CECPQ1." The CECPQ1 indicates that Google domain is conducting the test.
However, Google notes that not all of its domains have enabled the experiment, and that even those that have done so may experience a fading in and out of the experiment if issues are found.
"Our aims with this experiment are to highlight an area of research that Google believes to be important and to gain real-world experience with the larger data structures that post-quantum algorithms will likely require," Braithwaite said.
Special Bulletin - My just released book,
is now on sales at Amazon.comGreat Reasons for Purchasing Netiquette IQ
· Get more email opens. Improve 100% or more.
· Receive more responses, interviews, appointments, prospects and sales.
· Be better understood.
· Eliminate indecisin.
· Avoid being spammed 100% or more.
· Have recipient finish reading your email content.
· Save time by reducing questions.
· Increase your level of clarity.
· Improve you time management with your email.
· Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.
=================================**Important note** - contact our company for very powerful solutions for IP
management (IPv4 and IPv6, security, firewall and APT solutions:
Another Special Announcement - Tune in to my radio interview, on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
In addition to this blog, I maintain a radio show on BlogtalkRadio online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahooa member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me firstname.lastname@example.org.