Tuesday, November 5, 2024
12.6 C
New York

Google Experiments With Post-Quantum Cryptography in Chrome

Quantum computing is a hot topic in the world of technology, as we get closer and closer to developing them for everyday use by many organizations including schools, businesses, governments, and consumers.  Although it is still what many would call a relatively new concept, quantum computing had come leaps and bounds since 1980 were when the idea was first put forward by Richard Feynman, and now Google are on the case to see what they can do with it.

Although there are many obvious benefits to introducing quantum computers into the world, such as the incredible speeds they would be able to run at and the capabilities they would offer, there will, of course, be negatives too.  One issue that needs to be addressed in the land of quantum computers is that being so intelligent, they could potentially decrypt any internet communication that was recorded in today’s time.  This does not bode well regarding National Security and other classified information that needs to remain that way for several years.

To try and combat this issue, Google is carrying out experiments currently that involves using a post-quantum key-exchange algorithm in some connections between desktop Chrome and its servers.  If you are a Chrome Canary user you can to check to see if you are being included as part of the experiment by visiting the security panel and looking for CECPQ1 – the post-quantum suite that allows the browser to connect to Google’s servers.

But don’t worry, Google have stressed that user security will not be comprised during this experiment, and just in case the post-quantum algorithm does get broken by the computers of today then HTTPS will still be used as part of the connection.  Although Google’s main aim here is to protect its people and make a secure digital future for all, this experiment will not be eternally ongoing and will be discontinued within two years to make way for one of Google’s next big ventures.

Story Via; Google Security Blog


More News To Read

Hot this week

Brooklyn Defendants Charged in Rideshare Hacking Scheme: Jailbroken Phones Used to Exploit Uber

Brooklyn federal court has charged two defendants, Eliahou Paldiel...

Detecting Defects in Next-Generation Computer Chips: The Future of TMD-Based Semiconductors

As technology advances, the demand for smaller, more powerful...

Merging Galaxies in the Early Universe: The Birth of a Monster Galaxy

Astronomers have recently observed a fascinating event in the...

Topics

Brooklyn Defendants Charged in Rideshare Hacking Scheme: Jailbroken Phones Used to Exploit Uber

Brooklyn federal court has charged two defendants, Eliahou Paldiel...

Detecting Defects in Next-Generation Computer Chips: The Future of TMD-Based Semiconductors

As technology advances, the demand for smaller, more powerful...

Merging Galaxies in the Early Universe: The Birth of a Monster Galaxy

Astronomers have recently observed a fascinating event in the...

NASA’s Roman Space Telescope to Uncover Galactic Fossils and Dark Matter Mysteries

NASA’s Roman Space Telescope is set to transform our...

Black Myth: Wukong – A Game that Gamers Love Despite Media Backlash

In a gaming industry increasingly influenced by social agendas,...

Gravitational Waves Reveal a ‘Supercool’ Secret About the Big Bang

In 2023, physicists made a groundbreaking discovery that could...

Related Articles

Popular Categories

Send this to a friend