Google begins preparing Chrome for the arrival of quantum computing

quantum computing google

One of the companies that today is investing the most in the development and design of quantum computing is Google, a company that in turn knows of the enormous advantages that this type of technology could offer to human beings but also, once it arrives, you can have your Bad points. Being precisely Google one of its promoters, it is not surprising that several of its engineering teams are already working on certain solutions for adapt current technology to this type of new machines with enormous capacities.

As it has transpired, Google today would be working on creating a version of Chrome which would implement an algorithm named as New Hope. Basically the problem found that this type of software would try to solve is that of encrypted communications. Apparently and according to what they say, the capabilities of quantum computing in terms of data processing are such that these computers would be capable of compromise current security systems or the security protocols used on the internet.

A quantum computer would be able to compromise the current security and encryption used in internet communications

The idea on which this new algorithm is being developed is to create a post-quantum key exchange system with which to ensure that the encryption of the future is not vulnerable to the use of quantum computers. Keep in mind that, according to Google, they literally do not seek to create a new standard, but to collect information and experience on how to develop this secure mechanism. As explained Matt bratihwaite, Google software engineer:

If large quantum computers can be built then the asymmetric encryption primitives currently used in TLS, the security protocol used in HTTPS, could be broken.

Further information: techcrunch


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.