Quantum computing vs. quantum crypto
-
The Cryptography video from Security+ doesn't clearly discuss the distinction between quantum computing and quantum cryptography. The former is crypto-relevant but still theoretical, and it's talked about a bit with the possible ability to crack crypto. Quantum crypto doesn't seem to be mentioned directly, though it's indirectly mentioned when discussing polarization measurement. Quantum crypto is very real.
If the course is updated, I suggest a bit more distinction and focus on what quantum crypto actually does (using measurement of entangled photons, along with a conventional-channel transmission of the way in which to make the measurement, to securely exchange new information which can then be used as a key).
-
Thanks for letting us know the mechanics behind the Quantum Computing vs Quantum Crypto!
The CompTIA Security+ is not where we would be trying to explain the mechanics of quantum crypto. We would more likely discuss a topic on how to configure a security system using Quantum Crypto rather than discussing the mechanics of the crypto in the Security+ show. The goal of this particular show is to get a member familiar with some of the different implementations of crypto that they might encounter in the field and not so much focusing in on any one crypto type.
It’s not that is isn’t a worthy pursuit, it is, but this would not be the place where we would go into much depth beyond where this type of crypto is used.
We do have a cryptography show that was recorded with Sean Oriyano in which he mentioned it there but I’m not sure how much in-depth even there but if there was any place explaining the “how it works” would go it would be in that show rather than the Security+ show.
Cordially,
Ronnie Wong
Host, ITProTV -
@Ronnie-Wong Fair enough. A mention was made of polarization, but that's really not important. I think the important takeaway is that QC is really a way of making a key exchange, and of knowing immediately whether there was an eavesdropper on the process. The two things that distinguish it are that immediate knowledge of whether there was eavesdropping or not and that it doesn't rely on the mathematical assumptions that underlie public key crypto.