![]() Even years later, some encrypted content may still have value for the attacker. Encrypted Data Can Be Harvested Now For Exploitation LaterĪ new threat, known as “harvest now, decrypt later,” is a technique in which an attacker will attempt to steal encrypted data and hold on to it, potentially for years, with hopes that advances in quantum computing will eventually make decryption possible. In a scenario where a military force has access to quantum computing and its opponent does not, the information asymmetry will likely render the latter incapable of protecting its assets, and it will be out-strategized at every turn. ![]() While quantum has the potential to solve incredibly complex problems in society today, it will be equally capable of being leveraged maliciously by nation-states in warfare. Some Nation-States Could Be More Vulnerable In Warfare
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |