Making the Case for Cryptographic Agility and Orchestration

The quantum threat to cybersecurity is easy enough to state. A quantum computer of sufficient size can efficiently factor integers and compute discrete logarithms by Shor’s algorithm, breaking much of the public-key cryptography in use today, including Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC).

Source: Dark Reading: Cloud

 


Date:

Categorie(s):