Updated
Updated · CyberInsider · May 1
Chris Peikert urges early post-quantum cryptography migration over encryption threat
Updated
Updated · CyberInsider · May 1

Chris Peikert urges early post-quantum cryptography migration over encryption threat

10 articles · Updated · CyberInsider · May 1
  • The University of Michigan professor said Google research cut estimated resources to crack secp256k1 by about 20 times, though such attacks remain unlikely for at least several years.
  • He said public-key cryptography, including internet authentication and cryptocurrencies, faces the main risk, while symmetric encryption is far less exposed and NIST-approved post-quantum algorithms currently appear stable.
  • Peikert warned migration cannot wait for quantum computers to break toy systems, because moving VPNs, messaging apps and crypto networks will require long planning, scarce expertise and protocol redesign.
Is the global rush to 'quantum-proof' the internet a vital defense or a costly overreaction to a distant threat?
Is a quantum heist targeting millions of dormant Bitcoin now inevitable before the network can ever adapt?
With hackers already harvesting our data, is the battle for digital privacy already lost to tomorrow's quantum computers?