Close Menu
GeekBlog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I used Gemini Nano Banana 2 to create sketchnotes – here’s what it got right (and hilariously wrong)

    March 4, 2026

    The Colorful MacBook Neo Is Apple’s Cheapest Laptop Ever

    March 4, 2026

    FCC chair calls Paramount/WBD merger “a lot cleaner” than defunct Netflix deal

    March 4, 2026
    Facebook X (Twitter) Instagram Threads
    GeekBlog
    • Home
    • Mobile
    • Tech News
    • Blog
    • How-To Guides
    • AI & Software
    Facebook
    GeekBlog
    Home»Tech News»The New Math of Quantum Cryptography
    Tech News

    The New Math of Quantum Cryptography

    Michael ComaousBy Michael ComaousSeptember 8, 20253 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    The New Math of Quantum Cryptography
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    The original version of this story appeared in Quanta Magazine.

    Hard problems are usually not a welcome sight. But cryptographers love them. That’s because certain hard math problems underpin the security of modern encryption. Any clever trick for solving them will doom most forms of cryptography.

    Several years ago, researchers found a radically new approach to encryption that lacks this potential weak spot. The approach exploits the peculiar features of quantum physics. But unlike earlier quantum encryption schemes, which only work for a few special tasks, the new approach can accomplish a much wider range of tasks. And it could work even if all the problems at the heart of ordinary “classical” cryptography turn out to be easily solvable.

    But this striking discovery relied on unrealistic assumptions. The result was “more of a proof of concept,” said Fermi Ma, a cryptography researcher at the Simons Institute for the Theory of Computing in Berkeley, California. “It is not a statement about the real world.”

    Now, a new paper by two cryptographers has laid out a path to quantum cryptography without those outlandish assumptions. “This paper is saying that if certain other conjectures are true, then quantum cryptography must exist,” Ma said.

    Castle in the Sky

    You can think of modern cryptography as a tower with three essential parts. The first part is the bedrock deep beneath the tower, which is made of hard mathematical problems. The tower itself is the second part—there you can find specific cryptographic protocols that let you send private messages, sign digital documents, cast secret ballots, and more.

    In between, securing those day-to-day applications to mathematical bedrock, is a foundation made of building blocks called one-way functions. They’re responsible for the asymmetry inherent in any encryption scheme. “It’s one-way because you can encrypt messages, but you can’t decrypt them,” said Mark Zhandry, a cryptographer at NTT Research.

    In the 1980s, researchers proved that cryptography built atop one-way functions would ensure security for many different tasks. But decades later, they still aren’t certain that the bedrock is strong enough to support it. The trouble is that the bedrock is made of special hard problems—technically known as NP problems—whose defining feature is that it’s easy to check whether any candidate solution is correct. (For example, breaking a number into its prime factors is an NP problem: hard to do for large numbers, but easy to check.)

    Many of these problems seem intrinsically difficult, but computer scientists haven’t been able to prove it. If someone discovers an ingenious algorithm for rapidly solving the hardest NP problems, the bedrock will crumble, and the whole tower will collapse.

    Unfortunately, you can’t simply move your tower elsewhere. The tower’s foundation—one-way functions—can only sit on a bedrock of NP problems.

    To build a tower on harder problems, cryptographers would need a new foundation that isn’t made of one-way functions. That seemed impossible until just a few years ago, when researchers realized that quantum physics could help.

    Cryptography Math Quantum
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
    Previous ArticleCivilization VII team at Firaxis Games faces layoffs
    Next Article Geekom’s 14-inch GeekBook X14 Pro laptop weighs just 2.2 pounds and includes a Core Ultra 9 processor
    Michael Comaous
    • Website

    Michael Comaous is a dedicated professional with a passion for technology, innovation, and creative problem-solving. Over the years, he has built experience across multiple industries, combining strategic thinking with hands-on expertise to deliver meaningful results. Michael is known for his curiosity, attention to detail, and ability to explain complex topics in a clear and approachable way. Whether he’s working on new projects, writing, or collaborating with others, he brings energy and a forward-thinking mindset to everything he does.

    Related Posts

    10 Mins Read

    I used Gemini Nano Banana 2 to create sketchnotes – here’s what it got right (and hilariously wrong)

    2 Mins Read

    The Colorful MacBook Neo Is Apple’s Cheapest Laptop Ever

    2 Mins Read

    FCC chair calls Paramount/WBD merger “a lot cleaner” than defunct Netflix deal

    2 Mins Read

    Who needs data centers in space when they can float offshore?

    3 Mins Read

    I’m not ashamed to admit the Kobo Remote is the best gadget I’ve bought this year

    6 Mins Read

    Skyrover S1: The lightweight cinematic drone leading the next wave of accessible aerial creativity

    Top Posts

    Discord will require a face scan or ID for full access next month

    February 9, 2026761 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025561 Views

    Past Wordle answers – all solutions so far, alphabetical and by date

    August 1, 2025230 Views
    Stay In Touch
    • Facebook

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Discord will require a face scan or ID for full access next month

    February 9, 2026761 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025561 Views

    Past Wordle answers – all solutions so far, alphabetical and by date

    August 1, 2025230 Views
    Our Picks

    I used Gemini Nano Banana 2 to create sketchnotes – here’s what it got right (and hilariously wrong)

    March 4, 2026

    The Colorful MacBook Neo Is Apple’s Cheapest Laptop Ever

    March 4, 2026

    FCC chair calls Paramount/WBD merger “a lot cleaner” than defunct Netflix deal

    March 4, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 GeekBlog

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.