{"id":416,"date":"2021-10-29T11:46:21","date_gmt":"2021-10-29T11:46:21","guid":{"rendered":"https:\/\/website.prod.unilu.spikeseed.cloud\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/"},"modified":"2021-10-29T11:46:21","modified_gmt":"2021-10-29T11:46:21","slug":"are-we-secure-against-post-quantum-cyber-attacks","status":"publish","type":"news","link":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/","title":{"rendered":"Are We Secure Against Post-Quantum Cyber-Attacks?"},"content":{"rendered":"<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><p>How safe is your data? Currently, most computer and mobile device users benefit from a generally high level of security, mainly since our data and communications \u2013 such as those processed in databases, payments, cloud storage, email and many other applications \u2013 are, for the most part, encrypted. But the current encryption techniques might soon become obsolete. So soon, in fact, that the New Scientist recently reported* that intelligence agencies might already be intercepting and storing encrypted data to decrypt in the very near future. The era of post-quantum cryptography is upon us, and its possibilities are unsettling.<\/p><p>The risk derives from the quick development of quantum computing, a technology that has been around since the 90s, at least in experimental form, and that is\u00a0<a href=\"https:\/\/fortune.com\/2021\/09\/22\/ibm-quantum-computing-accelerator-training\/\" target=\"_blank\" title=\"\" rel=\"noopener\">quickly gaining commercial pace<\/a>. Instead of using bits to compute, quantum computers use\u00a0<i>qubits<\/i>\u00a0\u2013 tiny units of information that not only can represent the finite states 1 and 0 (as bits<i>\u00a0<\/i>currently do), but also both states at the same time. This means that quantum computers, once they will be viable, will feature\u00a0computational capabilities that are orders of magnitude more powerful than those of normal computers.<\/p><p>For close to two decades, researchers and institutions alike have been working on the security challenges that this technology is about to introduce, particularly regarding cryptography. To make an example, currently most of our emails and messages are encoded into unintelligible strings based on complex cryptographic algorithms \u2013 mathematical functions that transform the information to conceal it from anybody else but the recipient. In the same way that they have been designed, however, these algorithms can also be broken, yet the vast amount of time that would require with our current technology makes it unfeasible.\u00a0And that is the crux of the matter: with their greatly increased computational power, quantum computers will be able to easily decode some of today\u2019s encryption ciphers, especially those based on public-key protocols.\u00a0\u00a0<\/p><p>As we hover closer to the commercial deployment of quantum computers, it becomes even more essential to establish new, more powerful algorithms that will continue to ensure the privacy and safety we currently enjoy. It is therefore only natural that, in addition to researchers, institutions have been looking into identifying robust quantum-resistant algorithms for many years. Among them the U.S. National Institute of Standard and Technology (NIST),\u00a0which in 2016 has\u00a0initiated a process to solicit, evaluate, and standardise one or more quantum-resistant public-key cryptographic algorithms.\u00a0By the time the deadline elapsed, in 2017, several candidates had been submitted. Since then, they are being tested and evaluated by NIST as well as by researchers worldwide.<\/p><p>One of these candidates is the\u00a0<a href=\"https:\/\/sike.org\/\" target=\"_blank\" title=\"\" rel=\"noopener\">Supersingular Isogeny Key Encapsulation (SIKE)<\/a>, a suite to exchange keys needed to encrypt and decrypt information. SIKE\u00a0has been submitted to NIST in 2017, having been developed for years prior by an international group of academic and industry researchers in cryptography.\u00a0<\/p><p>In order to foster cryptanalysis on SIKE, Microsoft\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/sike-cryptographic-challenge\" target=\"_blank\" title=\"\" rel=\"noopener\">launched a challenge<\/a>\u00a0in June 2021 in which they asked the cryptography community to try and break two instances of SIKE with \u201ctoy\u201d security parameters. In particular, Microsoft proposed values for this instance that are lower than those proposed for standardisation at NIST. Gauging which level of security is necessary is very important, because encrypting information has a very high cost \u2013 both in terms of power and time. The company offered an award of 5,000 $ for breaking the smaller instance of the parameters, and 50,000 $ for\u00a0the bigger instance.\u00a0<\/p><p>In August 2021, a doctoral candidate at the University of Luxembourg, Giuseppe Vitto, and alumnus Aleksei Udovenko, Cryptography Expert at CryptoExperts, broke the smaller instance and were awarded the prize of 5,000 $. Crucially,\u00a0though research on these algorithms is priceless, the prizes are purposedly kept low to attract new and innovative methods in cryptanalysis. \u201cThe challenge was to break the algorithm in this configuration not with sheer computational power \u2013 which was possible, but very expensive \u2013 but by developing new mathematical ideas. If anybody managed, of course, it meant the parameters needed to be revised,\u201d says Vitto, a member of the <a href=\"https:\/\/wwwfr.uni.lu\/snt\/research\/cryptolux\" target=\"_blank\" title=\"\" rel=\"noopener\">CryptoLUX<\/a>\u00a0research group at SnT.<\/p><p>\u201cOur solution is based on an approach similar to the six degrees of separation\u00a0\u2013 the idea that any two people on Earth are six connections away from each other. To make an easy comparison, we could say that the problem we were trying to solve was: find the chain of connections that ties together any two strangers in the world. The computation is exponential: we start looking at each person\u2019s friends to find that central connection between the two initial subjects. Only that instead of six degrees, we worked on a chain of 91 degrees in a world with a population of trillions of quadrillions\u201d says Vitto.<\/p><p>Their solution follows one of the two classical methods to break suites like SIKE \u2013 an approach called\u00a0<strong>meet-in-the-middle<\/strong>, which presents a big problem right from the start: due to its memory requirements, it\u2019s simply not feasible for real instances of SIKE. \u201cResearchers realised that storing and managing the data required to attack SIKE with the meet-in-the-middle approach \u2013 as we go back and forth, so to speak, between each person\u2019s contacts \u2013 quickly becomes unfeasible due to the huge amount of memory needed to complete it,\u201d says Udovenko. So, most researchers tried to break the algorithm by using the other classical approach \u2013 the\u00a0<strong>van Oorschot-Wiener<\/strong>\u00a0approach.<\/p><p>In fact, also in June, one of SIKE\u2019s authors, Luca De Feo \u2013 presenting at NIST\u2019s\u00a0<a href=\"https:\/\/csrc.nist.gov\/events\/2021\/third-pqc-standardization-conference\" target=\"_blank\" title=\"\" rel=\"noopener\">Third PQC Standardization Conference<\/a>\u00a0about SIKE in general (not about the toy parameter instance) &#8211;\u00a0<a href=\"https:\/\/csrc.nist.gov\/CSRC\/media\/Presentations\/sike-round-3-presentation\/images-media\/session-6-sike-de-feo.pdf\" target=\"_blank\" title=\"\" rel=\"noopener\">stated that<\/a>\u00a0\u201c[The] Best attack is the generic van Oorschot-Wiener (vOW) parallel collision finding algorithm\u201d.<\/p><p>\u201cOr so they thought,\u201d says Vitto, \u201cbecause the vOW approach requires less memory, and memory access \u2013 and the latency it causes \u2013 is always a bottleneck\u201d. That is, in fact, for a simple reason: ideally, cryptanalysts would use RAM memory, which is much quicker than even the quickest SSD hard disks. To make an easy comparison with an internet browser, using RAM is like keeping 20 tabs open at the same time \u2013 and using SSD is like manually going through your list of bookmarks to open each website one by one. Solving this challenge with meet-in-the-middle needed many Terabytes of memory.\u00a0<\/p><p>But Udovenko and Vitto found a simple and elegant solution to solve the memory latency problem when using random access patterns \u2013 they sorted the data, and compared them in a sequential manner, rather than randomly (as meet-in-the-middle usually prescribes). That allowed them to drastically cut down storage requirements, which in turn made it feasible to use SSD memory instead of RAM, and, together with other optimisations, break the algorithm and win the challenge.\u00a0The attack was carried out using the <a href=\"https:\/\/hpc.uni.lu\" target=\"_blank\" title=\"\" rel=\"noopener\">HPC facilities<\/a> of the University of Luxembourg, and required\u00a0less than 10 core-years and 256\u00a0Terabytes of high performance network storage.<\/p><p>The team has just published\u00a0<a href=\"https:\/\/eprint.iacr.org\/2021\/1421.pdf\" target=\"_blank\" title=\"\" rel=\"noopener\">a paper on the attack<\/a>\u00a0to explain their method in detail, and they were awarded at the\u00a0<a href=\"https:\/\/eurocrypt.iacr.org\/2021\/\" target=\"_blank\" title=\"\" rel=\"noopener\">Eurocrypt 2021<\/a>\u00a0conference, which took place on the 17-21 October. One question remains open: will they participate in the bigger challenge? \u201cWe can\u2019t use the method we\u2019ve used in this instance for the bigger challenge, because our computational resources do not really scale\u201d they say, \u201cbut that doesn\u2019t mean that we won\u2019t try harder\u201d.<\/p><p>\u00a0\u00a0<\/p><p>*New Scientist,\u00a0<a href=\"https:\/\/www.newscientist.com\/article\/2293341-spies-may-be-storing-data-to-decrypt-with-a-future-quantum-computer\/\" target=\"_blank\" title=\"\" rel=\"noopener\">12 October 2021<\/a>.<\/p><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>How safe is your data? Currently, most computer and mobile device users benefit from a generally high level of security, mainly since our data and communications \u2013 such as those processed in databases, payments, cloud storage, email and many other applications \u2013 are, for the most part, encrypted. But the current encryption techniques might soon become obsolete. So soon, in fact, that the New Scientist recently reported* that intelligence agencies might already be intercepting and storing encrypted data to decrypt in the very near future. The era of post-quantum cryptography is upon us, and its possibilities are unsettling.<\/p>\n","protected":false},"author":0,"featured_media":417,"template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false},"news-category":[3],"news-topic":[],"organisation":[183],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Are We Secure Against Post-Quantum Cyber-Attacks? - SnT actualit\u00e9s I Universit\u00e9 du Luxembourg<\/title>\n<meta name=\"description\" content=\"How safe is your data? Currently, most computer and mobile device users benefit from a generally high level of security, mainly since our data and communications \u2013 such as those processed in databases, payments, cloud storage, email and many other applications \u2013 are, for the most part, encrypted. But the current encryption techniques might soon become obsolete. So soon, in fact, that the New Scientist recently reported* that intelligence agencies might already be intercepting and storing encrypted data to decrypt in the very near future. The era of post-quantum cryptography is upon us, and its possibilities are unsettling.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are We Secure Against Post-Quantum Cyber-Attacks?\" \/>\n<meta property=\"og:description\" content=\"How safe is your data? Currently, most computer and mobile device users benefit from a generally high level of security, mainly since our data and communications \u2013 such as those processed in databases, payments, cloud storage, email and many other applications \u2013 are, for the most part, encrypted. But the current encryption techniques might soon become obsolete. So soon, in fact, that the New Scientist recently reported* that intelligence agencies might already be intercepting and storing encrypted data to decrypt in the very near future. The era of post-quantum cryptography is upon us, and its possibilities are unsettling.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"SnT FR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/10\/are_we_secure_against_post_quantum_cyber_attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Are We Secure Against Post-Quantum Cyber-Attacks?\",\"datePublished\":\"2021-10-29T11:46:21+00:00\",\"dateModified\":\"2021-10-29T11:46:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/\"},\"wordCount\":1219,\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/10\/are_we_secure_against_post_quantum_cyber_attacks.jpg\",\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/\",\"name\":\"Are We Secure Against Post-Quantum Cyber-Attacks? - SnT actualit\u00e9s I Universit\u00e9 du Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/10\/are_we_secure_against_post_quantum_cyber_attacks.jpg\",\"datePublished\":\"2021-10-29T11:46:21+00:00\",\"dateModified\":\"2021-10-29T11:46:21+00:00\",\"description\":\"How safe is your data? Currently, most computer and mobile device users benefit from a generally high level of security, mainly since our data and communications \u2013 such as those processed in databases, payments, cloud storage, email and many other applications \u2013 are, for the most part, encrypted. But the current encryption techniques might soon become obsolete. So soon, in fact, that the New Scientist recently reported* that intelligence agencies might already be intercepting and storing encrypted data to decrypt in the very near future. The era of post-quantum cryptography is upon us, and its possibilities are unsettling.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/10\/are_we_secure_against_post_quantum_cyber_attacks.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/10\/are_we_secure_against_post_quantum_cyber_attacks.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interdisciplinary Centre for Security, Reliability and Trust (SnT)\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/news\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Are We Secure Against Post-Quantum Cyber-Attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"name\":\"SnT\",\"description\":\"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\"},\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\",\"name\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\",\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/school\/snt-lu\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are We Secure Against Post-Quantum Cyber-Attacks? - SnT actualit\u00e9s I Universit\u00e9 du Luxembourg","description":"How safe is your data? Currently, most computer and mobile device users benefit from a generally high level of security, mainly since our data and communications \u2013 such as those processed in databases, payments, cloud storage, email and many other applications \u2013 are, for the most part, encrypted. But the current encryption techniques might soon become obsolete. So soon, in fact, that the New Scientist recently reported* that intelligence agencies might already be intercepting and storing encrypted data to decrypt in the very near future. The era of post-quantum cryptography is upon us, and its possibilities are unsettling.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/","og_locale":"fr_FR","og_type":"article","og_title":"Are We Secure Against Post-Quantum Cyber-Attacks?","og_description":"How safe is your data? Currently, most computer and mobile device users benefit from a generally high level of security, mainly since our data and communications \u2013 such as those processed in databases, payments, cloud storage, email and many other applications \u2013 are, for the most part, encrypted. But the current encryption techniques might soon become obsolete. So soon, in fact, that the New Scientist recently reported* that intelligence agencies might already be intercepting and storing encrypted data to decrypt in the very near future. The era of post-quantum cryptography is upon us, and its possibilities are unsettling.","og_url":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/","og_site_name":"SnT FR","og_image":[{"width":800,"height":600,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/10\/are_we_secure_against_post_quantum_cyber_attacks.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/"},"author":{"name":"","@id":""},"headline":"Are We Secure Against Post-Quantum Cyber-Attacks?","datePublished":"2021-10-29T11:46:21+00:00","dateModified":"2021-10-29T11:46:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/"},"wordCount":1219,"publisher":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#organization"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/10\/are_we_secure_against_post_quantum_cyber_attacks.jpg","inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/","url":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/","name":"Are We Secure Against Post-Quantum Cyber-Attacks? - SnT actualit\u00e9s I Universit\u00e9 du Luxembourg","isPartOf":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/10\/are_we_secure_against_post_quantum_cyber_attacks.jpg","datePublished":"2021-10-29T11:46:21+00:00","dateModified":"2021-10-29T11:46:21+00:00","description":"How safe is your data? Currently, most computer and mobile device users benefit from a generally high level of security, mainly since our data and communications \u2013 such as those processed in databases, payments, cloud storage, email and many other applications \u2013 are, for the most part, encrypted. But the current encryption techniques might soon become obsolete. So soon, in fact, that the New Scientist recently reported* that intelligence agencies might already be intercepting and storing encrypted data to decrypt in the very near future. The era of post-quantum cryptography is upon us, and its possibilities are unsettling.","breadcrumb":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/10\/are_we_secure_against_post_quantum_cyber_attacks.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2021\/10\/are_we_secure_against_post_quantum_cyber_attacks.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/snt-fr\/news\/are-we-secure-against-post-quantum-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/fr"},{"@type":"ListItem","position":2,"name":"Interdisciplinary Centre for Security, Reliability and Trust (SnT)","item":"https:\/\/www.uni.lu\/snt-fr\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/www.uni.lu\/snt-fr\/news\/"},{"@type":"ListItem","position":4,"name":"Are We Secure Against Post-Quantum Cyber-Attacks?"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/snt-fr\/#website","url":"https:\/\/www.uni.lu\/snt-fr\/","name":"SnT","description":"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#organization"},"alternateName":"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/snt-fr\/#organization","name":"SnT - Universit\u00e9 du Luxembourg I Uni.lu","alternateName":"Interdisciplinary Centre for Security, Reliability and Trust","url":"https:\/\/www.uni.lu\/snt-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"SnT - Universit\u00e9 du Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/school\/snt-lu\/"]}]}},"blog_id":13,"_links":{"self":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/news\/416"}],"collection":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/news\/416\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media\/417"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media?parent=416"}],"wp:term":[{"taxonomy":"news-category","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/news-category?post=416"},{"taxonomy":"news-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/news-topic?post=416"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/organisation?post=416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}